id
stringlengths 9
16
| submitter
stringlengths 1
64
⌀ | authors
stringlengths 4
14.5k
| title
stringlengths 1
278
| comments
stringlengths 1
762
⌀ | journal-ref
stringlengths 1
557
⌀ | doi
stringlengths 11
153
⌀ | report-no
stringlengths 2
479
⌀ | categories
stringlengths 5
104
| license
stringclasses 9
values | abstract
stringlengths 6
3.8k
| versions
listlengths 1
103
| update_date
timestamp[s] | authors_parsed
listlengths 1
942
| categories_descriptions
listlengths 1
13
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0605140
|
Mark Jerrum
|
Leslie Ann Goldberg and Mark Jerrum
|
Inapproximability of the Tutte polynomial
|
Minor changes to correct typos and provide clarification. Also
includes an extra figure
|
Infomation and Computation 206(7), 908-929 (July 2008)
|
10.1016/j.ic.2008.04.003
| null |
cs.CC math.CO
| null |
The Tutte polynomial of a graph G is a two-variable polynomial T(G;x,y) that
encodes many interesting properties of the graph. We study the complexity of
the following problem, for rationals x and y: take as input a graph G, and
output a value which is a good approximation to T(G;x,y). Jaeger, Vertigan and
Welsh have completely mapped the complexity of exactly computing the Tutte
polynomial. They have shown that this is #P-hard, except along the hyperbola
(x-1)(y-1)=1 and at four special points. We are interested in determining for
which points (x,y) there is a "fully polynomial randomised approximation
scheme" (FPRAS) for T(G;x,y). Under the assumption RP is not equal to NP, we
prove that there is no FPRAS at (x,y) if (x,y) is in one of the half-planes
x<-1 or y<-1 (excluding the easy-to-compute cases mentioned above). Two
exceptions to this result are the half-line x<-1, y=1 (which is still open) and
the portion of the hyperbola (x-1)(y-1)=2 corresponding to y<-1 which we show
to be equivalent in difficulty to approximately counting perfect matchings. We
give further intractability results for (x,y) in the vicinity of the origin. A
corollary of our results is that, under the assumption RP is not equal to NP,
there is no FPRAS at the point (x,y)=(0,1--lambda) when \lambda>2 is a positive
integer. Thus there is no FPRAS for counting nowhere-zero \lambda flows for
\lambda>2. This is an interesting consequence of our work since the
corresponding decision problem is in P for example for \lambda=6.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 11:48:20 GMT"
},
{
"version": "v2",
"created": "Mon, 30 Jul 2007 15:17:46 GMT"
}
] | 2008-07-20T00:00:00 |
[
[
"Goldberg",
"Leslie Ann",
""
],
[
"Jerrum",
"Mark",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0605141
|
Amos Korman
|
Amos Korman
|
General Compact Labeling Schemes for Dynamic Trees
|
32 pages, no figures, the extended abstarct appeired in DISC 2005
| null | null | null |
cs.DC
| null |
Let $F$ be a function on pairs of vertices. An {\em $F$- labeling scheme} is
composed of a {\em marker} algorithm for labeling the vertices of a graph with
short labels, coupled with a {\em decoder} algorithm allowing one to compute
$F(u,v)$ of any two vertices $u$ and $v$ directly from their labels. As
applications for labeling schemes concern mainly large and dynamically changing
networks, it is of interest to study {\em distributed dynamic} labeling
schemes. This paper investigates labeling schemes for dynamic trees.
This paper presents a general method for constructing labeling schemes for
dynamic trees. Our method is based on extending an existing {\em static} tree
labeling scheme to the dynamic setting. This approach fits many natural
functions on trees, such as ancestry relation, routing (in both the adversary
and the designer port models), nearest common ancestor etc.. Our resulting
dynamic schemes incur overheads (over the static scheme) on the label size and
on the communication complexity. Informally, for any function $k(n)$ and any
static $F$-labeling scheme on trees, we present an $F$-labeling scheme on
dynamic trees incurring multiplicative overhead factors
(over the static scheme) of $O(\log_{k(n)} n)$ on the label size and
$O(k(n)\log_{k(n)} n)$ on the amortized message complexity. In particular, by
setting $k(n)=n^{\epsilon}$ for any $0<\epsilon<1$, we obtain dynamic labeling
schemes with asymptotically optimal label sizes and sublinear amortized message
complexity for all the above mentioned functions.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 13:54:26 GMT"
}
] | 2016-08-31T00:00:00 |
[
[
"Korman",
"Amos",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0605142
|
Corre Gwenole
|
Gwenol\'e Corre (LESTER), Nathalie Julien (LESTER), Eric Senn
(LESTER), Eric Martin (LESTER)
|
Int\'{e}gration de la synth\`{e}se m\'{e}moire dans l'outil de
synth\`{e}se d'architecture GAUT Low Power
| null |
JFAAA'02 (Journ\'{e}es Francophone Ad\'{e}quation Algorithme
Architecture), Tunisie (2002)
| null | null |
cs.AR
| null |
The systems supporting signal and image applications process large amount of
data. That involves an intensive use of the memory which becomes the bottleneck
of systems. Memory limits performances and represents a significant proportion
of total consumption. In the development high level synthesis tool called GAUT
Low Power, we are interested in the synthesis of the memory unit. In this work,
we integrate the data storage and data transfert to constraint the high level
synthesis of the datapath's execution unit.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:04:18 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Corre",
"Gwenolé",
"",
"LESTER"
],
[
"Julien",
"Nathalie",
"",
"LESTER"
],
[
"Senn",
"Eric",
"",
"LESTER"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605143
|
Corre Gwenole
|
Philippe Coussy (LESTER), Gwenol\'e Corre (LESTER), Pierre Bomel
(LESTER), Eric Senn (LESTER), Eric Martin (LESTER)
|
High-level synthesis under I/O Timing and Memory constraints
| null |
International Symposium on Circuits And Systems (2005) 680-683
| null | null |
cs.AR
| null |
The design of complex Systems-on-Chips implies to take into account
communication and memory access constraints for the integration of dedicated
hardware accelerator. In this paper, we present a methodology and a tool that
allow the High-Level Synthesis of DSP algorithm, under both I/O timing and
memory constraints. Based on formal models and a generic architecture, this
tool helps the designer to find a reasonable trade-off between both the
required I/O timing behavior and the internal memory access parallelism of the
circuit. The interest of our approach is demonstrated on the case study of a
FFT algorithm.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:07:51 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Corre",
"Gwenolé",
"",
"LESTER"
],
[
"Bomel",
"Pierre",
"",
"LESTER"
],
[
"Senn",
"Eric",
"",
"LESTER"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605144
|
Corre Gwenole
|
Gwenol\'e Corre (LESTER), Nathalie Julien (LESTER), Eric Senn
(LESTER), Eric Martin (LESTER)
|
A Memory Aware High Level Synthesis Too
|
ISBN 0-7695-2097-9
|
International Symposium on VLSI (2004) 279-280
| null | null |
cs.AR
| null |
We introduce a new approach to take into account the memory architecture and
the memory mapping in High- Level Synthesis for data intensive applications. We
formalize the memory mapping as a set of constraints for the synthesis, and
defined a Memory Constraint Graph and an accessibility criterion to be used in
the scheduling step. We use a memory mapping file to include those memory
constraints in our HLS tool GAUT. It is possible, with the help of GAUT, to
explore a wide range of solutions, and to reach a good tradeoff between time,
power-consumption, and area.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:09:18 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Corre",
"Gwenolé",
"",
"LESTER"
],
[
"Julien",
"Nathalie",
"",
"LESTER"
],
[
"Senn",
"Eric",
"",
"LESTER"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605145
|
Corre Gwenole
|
Gwenol\'e Corre (LESTER), Eric Senn (LESTER), Nathalie Julien
(LESTER), Eric Martin (LESTER)
|
Memory Aware High-Level Synthesis for Embedded Systems
| null |
IADIS conference on Applied Computing, Portugal (2004) 499-506
| null | null |
cs.AR
| null |
We introduce a new approach to take into account the memory architecture and
the memory mapping in the High- Level Synthesis of Real-Time embedded systems.
We formalize the memory mapping as a set of constraints used in the scheduling
step. We use a memory mapping file to include those memory constraints in our
HLS tool GAUT. Our scheduling algorithm exhibits a relatively low complexity
that permits to tackle complex designs in a reasonable time. Finally, we show
how to explore, with the help of GAUT, a wide range of solutions, and to reach
a good tradeoff between time, power-consumption, and area.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:09:32 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Corre",
"Gwenolé",
"",
"LESTER"
],
[
"Senn",
"Eric",
"",
"LESTER"
],
[
"Julien",
"Nathalie",
"",
"LESTER"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605146
|
Corre Gwenole
|
Gwenol\'e Corre (LESTER), Philippe Coussy (LESTER), Pierre Bomel
(LESTER), Eric Senn (LESTER), Eric Martin (LESTER)
|
Synth\`{e}se Comportementale Sous Contraintes de Communication et de
Placement M\'{e}moire pour les composants du TDSI
| null |
GRETSI'05 (Colloque sur le Traitement du Signal et de l'Image),
Belgique (2005) 779-782
| null | null |
cs.AR
| null |
The design of complex Digital Signal Processing systems implies to minimize
architectural cost and to maximize timing performances while taking into
account communication and memory accesses constraints for the integration of
dedicated hardware accelerator. Unfortunately, the traditional Matlab/ Simulink
design flows gather not very flexible hardware blocs. In this paper, we present
a methodology and a tool that permit the High-Level Synthesis of DSP
applications, under both I/O timing and memory constraints. Based on formal
models and a generic architecture, our tool GAUT helps the designer in finding
a reasonable trade-off between the circuit's performance and its architectural
complexity. The efficiency of our approach is demonstrated on the case study of
a FFT algorithm.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:10:57 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Corre",
"Gwenolé",
"",
"LESTER"
],
[
"Coussy",
"Philippe",
"",
"LESTER"
],
[
"Bomel",
"Pierre",
"",
"LESTER"
],
[
"Senn",
"Eric",
"",
"LESTER"
],
[
"Martin",
"Eric",
"",
"LESTER"
]
] |
[
{
"class": "Computer Science",
"code": "cs.AR",
"description": "Covers systems organization and hardware architecture. Roughly includes material in ACM Subject Classes C.0, C.1, and C.5.",
"span": "(Hardware Architecture)"
}
] |
cs/0605147
|
Stephane Huet
|
St\'ephane Huet (IRISA / INRIA Rennes, IRISA / INRIA Rennes), Pascale
S\'ebillot (IRISA / INRIA Rennes), Guillaume Gravier (IRISA / INRIA Rennes)
|
Utilisation de la linguistique en reconnaissance de la parole : un
\'{e}tat de l'art
| null | null | null | null |
cs.HC cs.CL
| null |
To transcribe speech, automatic speech recognition systems use statistical
methods, particularly hidden Markov model and N-gram models. Although these
techniques perform well and lead to efficient systems, they approach their
maximum possibilities. It seems thus necessary, in order to outperform current
results, to use additional information, especially bound to language. However,
introducing such knowledge must be realized taking into account specificities
of spoken language (hesitations for example) and being robust to possible
misrecognized words. This document presents a state of the art of these
researches, evaluating the impact of the insertion of linguistic information on
the quality of the transcription.
|
[
{
"version": "v1",
"created": "Tue, 30 May 2006 15:32:41 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Huet",
"Stéphane",
"",
"IRISA / INRIA Rennes, IRISA / INRIA Rennes"
],
[
"Sébillot",
"Pascale",
"",
"IRISA / INRIA Rennes"
],
[
"Gravier",
"Guillaume",
"",
"IRISA / INRIA Rennes"
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0606001
|
David Steurer
|
David Steurer
|
Tight Bounds for the Min-Max Boundary Decomposition Cost of Weighted
Graphs
|
41 pages, full version of a paper that will appear in SPAA`06
| null | null | null |
cs.DS cs.DM
| null |
Many load balancing problems that arise in scientific computing applications
ask to partition a graph with weights on the vertices and costs on the edges
into a given number of almost equally-weighted parts such that the maximum
boundary cost over all parts is small.
Here, this partitioning problem is considered for bounded-degree graphs
G=(V,E) with edge costs c: E->R+ that have a p-separator theorem for some p>1,
i.e., any (arbitrarily weighted) subgraph of G can be separated into two parts
of roughly the same weight by removing a vertex set S such that the edges
incident to S in the subgraph have total cost at most proportional to (SUM_e
c^p_e)^(1/p), where the sum is over all edges e in the subgraph.
We show for all positive integers k and weights w that the vertices of G can
be partitioned into k parts such that the weight of each part differs from the
average weight by less than MAX{w_v; v in V}, and the boundary edges of each
part have cost at most proportional to (SUM_e c_e^p/k)^(1/p) + MAX_e c_e. The
partition can be computed in time nearly proportional to the time for computing
a separator S of G.
Our upper bound on the boundary costs is shown to be tight up to a constant
factor for infinitely many instances with a broad range of parameters. Previous
results achieved this bound only if one has c=1, w=1, and one allows parts with
weight exceeding the average by a constant fraction.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 01:47:38 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Steurer",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0606002
|
Wei-jen Hsu
|
Wei-jen Hsu, Debojyoti Dutta, and Ahmed Helmy
|
Mining Behavioral Groups in Large Wireless LANs
|
14 pages, 12 figures
| null | null | null |
cs.NI
| null |
One vision of future wireless networks is that they will be deeply integrated
and embedded in our lives and will involve the use of personalized mobile
devices. User behavior in such networks is bound to affect the network
performance. It is imperative to study and characterize the fundamental
structure of wireless user behavior in order to model, manage, leverage and
design efficient mobile networks. It is also important to make such study as
realistic as possible, based on extensive measurements collected from existing
deployed wireless networks.
In this study, using our systematic TRACE approach, we analyze wireless
users' behavioral patterns by extensively mining wireless network logs from two
major university campuses. We represent the data using location preference
vectors, and utilize unsupervised learning (clustering) to classify trends in
user behavior using novel similarity metrics. Matrix decomposition techniques
are used to identify (and differentiate between) major patterns. While our
findings validate intuitive repetitive behavioral trends and user grouping, it
is surprising to find the qualitative commonalities of user behaviors from the
two universities. We discover multi-modal user behavior for more than 60% of
the users, and there are hundreds of distinct groups with unique behavioral
patterns in both campuses. The sizes of the major groups follow a power-law
distribution. Our methods and findings provide an essential step towards
network management and behavior-aware network protocols and applications, to
name a few.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 01:21:39 GMT"
},
{
"version": "v2",
"created": "Sat, 30 Jun 2007 05:30:16 GMT"
}
] | 2007-06-30T00:00:00 |
[
[
"Hsu",
"Wei-jen",
""
],
[
"Dutta",
"Debojyoti",
""
],
[
"Helmy",
"Ahmed",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0606003
|
David Lorenz
|
Sergei Kojarski and David H. Lorenz
|
Modeling Aspect Mechanisms: A Top-Down Approach
| null |
In Proceedings of the 28th International Conference on Software
Engineering (ICSE'06), pages 212--221, Shanghai, China, May 20-28, 2006
| null |
CS-2006-04
|
cs.SE cs.PL
| null |
A plethora of diverse aspect mechanisms exist today, all of which integrate
concerns into artifacts that exhibit crosscutting structure. What we lack and
need is a characterization of the design space that these aspect mechanisms
inhabit and a model description of their weaving processes. A good design space
representation provides a common framework for understanding and evaluating
existing mechanisms. A well-understood model of the weaving process can guide
the implementor of new aspect mechanisms. It can guide the designer when
mechanisms implementing new kinds of weaving are needed. It can also help teach
aspect-oriented programming (AOP). In this paper we present and evaluate such a
model of the design space for aspect mechanisms and their weaving processes. We
model weaving, at an abstract level, as a concern integration process. We
derive a weaving process model (WPM) top-down, differentiating a reactive from
a nonreactive process. The model provides an in-depth explanation of the key
subpro existing aspect mechanisms.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:14:16 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kojarski",
"Sergei",
""
],
[
"Lorenz",
"David H.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606004
|
Victor Kryssanov
|
V.V. Kryssanov, V.A. Abramov, H. Hibino, Y. Fukuda
|
A Framework for the Development of Manufacturing Simulators: Towards New
Generation of Simulation Systems
|
9 pages, 6 figures. Preprint completed in 1998
|
In: H. Fujimoto and R.E. DeVor (eds), Proceedings of the 1998
Japan-U.S.A. Symposium on Flexible Automation. 1998, Vol. III, pp. 1307-1314
| null | null |
cs.CE cs.HC
| null |
In this paper, an attempt is made to systematically discuss the development
of simulation systems for manufacturing system design. General requirements on
manufacturing simulators are formulated and a framework to address the
requirements is suggested. Problems of information representation as an
activity underlying simulation are considered. This is to form the necessary
mathematical foundation for manufacturing simulations. The theoretical findings
are explored through a pilot study. A conclusion about the suitability of the
suggested approach to the development of simulation systems for manufacturing
system design is made, and implications for future research are described.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 02:36:12 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Hibino",
"H.",
""
],
[
"Fukuda",
"Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
}
] |
cs/0606005
|
Marine Minier
|
Samuel Galice (INRIA Rh\^one-Alpes), V\'eronique Legrand (INRIA
Rh\^one-Alpes), Marine Minier (INRIA Rh\^one-Alpes), John Mullins (INRIA
Rh\^one-Alpes), St\'ephane Ub\'eda (INRIA Rh\^one-Alpes)
|
The KAA project: a trust policy point of view
| null | null | null | null |
cs.NI
| null |
In the context of ambient networks where each small device must trust its
neighborhood rather than a fixed network, we propose in this paper a
\textit{trust management framework} inspired by known social patterns and based
on the following statements: each mobile constructs itself a local level of
trust what means that it does not accept recommendation by other peers, and the
only relevant parameter, beyond some special cases discussed later, to evaluate
the level of trust is the number of common trusted mobiles. These trusted
mobiles are considered as entries in a local database called history for each
device and we use identity-based cryptography to ensure strong security:
history must be a non-tansferable object.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 07:00:41 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Galice",
"Samuel",
"",
"INRIA Rhône-Alpes"
],
[
"Legrand",
"Véronique",
"",
"INRIA\n Rhône-Alpes"
],
[
"Minier",
"Marine",
"",
"INRIA Rhône-Alpes"
],
[
"Mullins",
"John",
"",
"INRIA\n Rhône-Alpes"
],
[
"Ubéda",
"Stéphane",
"",
"INRIA Rhône-Alpes"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0606006
|
Laurent Romary
|
Peter Wittenburg (MPIPS), Daan Broeder (MPIPS), Wolfgang Klein
(MPIPS), Stephen Levinson (MPIPS), Laurent Romary (INRIA Lorraine - LORIA)
|
Foundations of Modern Language Resource Archives
| null | null | null | null |
cs.CL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
A number of serious reasons will convince an increasing amount of researchers
to store their relevant material in centers which we will call "language
resource archives". They combine the duty of taking care of long-term
preservation as well as the task to give access to their material to different
user groups. Access here is meant in the sense that an active interaction with
the data will be made possible to support the integration of new data, new
versions or commentaries of all sort. Modern Language Resource Archives will
have to adhere to a number of basic principles to fulfill all requirements and
they will have to be involved in federations to create joint language resource
domains making it even more simple for the researchers to access the data. This
paper makes an attempt to formulate the essential pillars language resource
archives have to adhere to.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 09:14:51 GMT"
}
] | 2009-01-20T00:00:00 |
[
[
"Wittenburg",
"Peter",
"",
"MPIPS"
],
[
"Broeder",
"Daan",
"",
"MPIPS"
],
[
"Klein",
"Wolfgang",
"",
"MPIPS"
],
[
"Levinson",
"Stephen",
"",
"MPIPS"
],
[
"Romary",
"Laurent",
"",
"INRIA Lorraine - LORIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0606007
|
Andrew Pavlo
|
Andrew Pavlo (1), Christopher Homan (2), Jonathan Schull (2) ((1)
University of Wisconsin-Madison, (2) Rochester Institute of Technology)
|
A parent-centered radial layout algorithm for interactive graph
visualization and animation
| null | null | null | null |
cs.HC cs.CG cs.GR
| null |
We have developed (1) a graph visualization system that allows users to
explore graphs by viewing them as a succession of spanning trees selected
interactively, (2) a radial graph layout algorithm, and (3) an animation
algorithm that generates meaningful visualizations and smooth transitions
between graphs while minimizing edge crossings during transitions and in static
layouts.
Our system is similar to the radial layout system of Yee et al. (2001), but
differs primarily in that each node is positioned on a coordinate system
centered on its own parent rather than on a single coordinate system for all
nodes. Our system is thus easy to define recursively and lends itself to
parallelization. It also guarantees that layouts have many nice properties,
such as: it guarantees certain edges never cross during an animation.
We compared the layouts and transitions produced by our algorithms to those
produced by Yee et al. Results from several experiments indicate that our
system produces fewer edge crossings during transitions between graph drawings,
and that the transitions more often involve changes in local scaling rather
than structure.
These findings suggest the system has promise as an interactive graph
exploration tool in a variety of settings.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 16:56:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Pavlo",
"Andrew",
""
],
[
"Homan",
"Christopher",
""
],
[
"Schull",
"Jonathan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0606008
|
Joan Smith
|
Joan A. Smith, Martin Klein, Michael L. Nelson
|
Repository Replication Using NNTP and SMTP
|
This revised version has 24 figures and a more detailed discussion of
the experiments conducted by us
| null | null | null |
cs.DL
| null |
We present the results of a feasibility study using shared, existing,
network-accessible infrastructure for repository replication. We investigate
how dissemination of repository contents can be ``piggybacked'' on top of
existing email and Usenet traffic. Long-term persistence of the replicated
repository may be achieved thanks to current policies and procedures which
ensure that mail messages and news posts are retrievable for evidentiary and
other legal purposes for many years after the creation date. While the
preservation issues of migration and emulation are not addressed with this
approach, it does provide a simple method of refreshing content with unknown
partners.
|
[
{
"version": "v1",
"created": "Thu, 1 Jun 2006 17:45:36 GMT"
},
{
"version": "v2",
"created": "Thu, 2 Nov 2006 20:11:50 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Smith",
"Joan A.",
""
],
[
"Klein",
"Martin",
""
],
[
"Nelson",
"Michael L.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0606009
|
Lane A. Hemaspaandra
|
Piotr Faliszewski and Lane A. Hemaspaandra
|
The Consequences of Eliminating NP Solutions
| null | null | null |
URCS TR-2006-898
|
cs.CC
| null |
Given a function based on the computation of an NP machine, can one in
general eliminate some solutions? That is, can one in general decrease the
ambiguity? This simple question remains, even after extensive study by many
researchers over many years, mostly unanswered. However, complexity-theoretic
consequences and enabling conditions are known. In this tutorial-style article
we look at some of those, focusing on the most natural framings: reducing the
number of solutions of NP functions, refining the solutions of NP functions,
and subtracting from or otherwise shrinking #P functions. We will see how small
advice strings are important here, but we also will see how increasing advice
size to achieve robustness is central to the proof of a key ambiguity-reduction
result for NP functions.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 01:34:26 GMT"
},
{
"version": "v2",
"created": "Tue, 13 Jun 2006 18:01:43 GMT"
},
{
"version": "v3",
"created": "Mon, 19 Jun 2006 18:21:11 GMT"
},
{
"version": "v4",
"created": "Wed, 16 Aug 2006 17:15:17 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Faliszewski",
"Piotr",
""
],
[
"Hemaspaandra",
"Lane A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606010
|
Victor Kryssanov
|
V.V. Kryssanov, V.A. Abramov, Y. Fukuda, K. Konishi
|
A Decision-Making Support System Based on Know-How
|
6 pages, 5 figures. Preprint completed in 1997
|
CIRP Journal of Manufacturing Systems. 1998, Vol. 27, No.4,
427-432
| null | null |
cs.CE cs.AI
| null |
The research results described are concerned with: - developing a domain
modeling method and tools to provide the design and implementation of
decision-making support systems for computer integrated manufacturing; -
building a decision-making support system based on know-how and its software
environment. The research is funded by NEDO, Japan.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 03:06:07 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Abramov",
"V. A.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606011
|
Hao Chen
|
Hao Chen, Liang Ma and Jianhua Li
|
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
|
11 pages, new version, minor corrections
| null | null | null |
cs.CR cs.IT math.IT
| null |
Propagation criterion of degree $l$ and order $k$ ($PC(l)$ of order $k$) and
resiliency of vectorial Boolean functions are important for cryptographic
purpose (see [1, 2, 3,6, 7,8,10,11,16]. Kurosawa, Stoh [8] and Carlet [1] gave
a construction of Boolean functions satisfying $PC(l)$ of order $k$ from binary
linear or nonlinear codes in. In this paper, algebraic-geometric codes over
$GF(2^m)$ are used to modify Carlet and Kurosawa-Satoh's construction for
giving vectorial resilient Boolean functions satisfying $PC(l)$ of order $k$.
The new construction is compared with previously known results.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 05:50:15 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jun 2006 09:49:43 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Jul 2006 07:01:10 GMT"
},
{
"version": "v4",
"created": "Sun, 3 Sep 2006 08:13:41 GMT"
},
{
"version": "v5",
"created": "Wed, 6 Sep 2006 04:33:25 GMT"
},
{
"version": "v6",
"created": "Tue, 19 Sep 2006 04:02:59 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Hao",
""
],
[
"Ma",
"Liang",
""
],
[
"Li",
"Jianhua",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606012
|
Maurice Margenstern
|
Maurice Margenstern
|
On the communication between cells of a cellular automaton on the penta-
and heptagrids of the hyperbolic plane
|
19 pages, 6 figures
|
Journal of Cellular Automata, 1(3), (2006), 213-232
| null | null |
cs.CG cs.CC
| null |
This contribution belongs to a combinatorial approach to hyperbolic geometry
and it is aimed at possible applications to computer simulations.
It is based on the splitting method which was introduced by the author and
which is reminded in the second section of the paper. Then we sketchily remind
the application to the classical case of the pentagrid, i.e. the tiling of the
hyperbolic plane which is generated by reflections of the regular rectangular
pentagon in its sides and, recursively, of its images in their sides. From this
application, we derived a system of coordinates to locate the tiles, allowing
an implementation of cellular automata.
At the software level, cells exchange messages thanks to a new representation
which improves the speed of contacts between cells. In the new setting,
communications are exchanged along actual geodesics and the contribution of the
cellular automaton is also linear in the coordinates of the cells.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 07:34:17 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Margenstern",
"Maurice",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606013
|
Manuel Abellanas
|
M. Abellanas, A. Bajuelos, G. Hern\'andez, F. Hurtado, I. Matos, B.
Palop
|
Good Illumination of Minimum Range
| null | null | null | null |
cs.CG
| null |
A point p is 1-well illuminated by a set F of n point lights if p lies in the
interior of the convex hull of F. This concept corresponds to triangle-guarding
or well-covering. In this paper we consider the illumination range of the light
sources as a parameter to be optimized. First, we solve the problem of
minimizing the light sources' illumination range to 1-well illuminate a given
point p. We also compute a minimal set of light sources that 1-well illuminates
p with minimum illumination range. Second, we solve the problem of minimizing
the light sources' illumination range to 1-well illuminate all the points of a
line segment with an O(n^2) algorithm. Finally, we give an O(n^2 log n)
algorithm for preprocessing the data so that one can obtain the illumination
range needed to 1-well illuminate a point of a line segment in O(log n) time.
These results can be applied to solve problems of 1-well illuminating a
trajectory by approaching it to a polygonal path.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 11:24:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Abellanas",
"M.",
""
],
[
"Bajuelos",
"A.",
""
],
[
"Hernández",
"G.",
""
],
[
"Hurtado",
"F.",
""
],
[
"Matos",
"I.",
""
],
[
"Palop",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0606014
|
Wei Wu
|
Wei Wu, Sriram Vishwanath and Ari Arapostathis
|
On the Capacity of Multiple Access Channels with State Information and
Feedback
|
Prelimenary result appears in ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
In this paper, the multiple access channel (MAC) with channel state is
analyzed in a scenario where a) the channel state is known non-causally to the
transmitters and b) there is perfect causal feedback from the receiver to the
transmitters. An achievable region and an outer bound are found for a discrete
memoryless MAC that extend existing results, bringing together ideas from the
two separate domains of MAC with state and MAC with feedback. Although this
achievable region does not match the outer bound in general, special cases
where they meet are identified.
In the case of a Gaussian MAC, a specialized achievable region is found by
using a combination of dirty paper coding and a generalization of the
Schalkwijk-Kailath, Ozarow and Merhav-Weissman schemes, and this region is
found to be capacity achieving. Specifically, it is shown that additive
Gaussian interference that is known non-causally to the transmitter causes no
loss in capacity for the Gaussian MAC with feedback.
|
[
{
"version": "v1",
"created": "Sat, 3 Jun 2006 03:54:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Wei",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Arapostathis",
"Ari",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606015
|
Rajesh Sundaresan
|
Rajesh Sundaresan and Arun Padakandla
|
The Size of Optimal Sequence Sets for Synchronous CDMA Systems
|
18 pages, 2 figures, technical report
| null | null | null |
cs.IT math.IT
| null |
The sum capacity on a symbol-synchronous CDMA system having processing gain
$N$ and supporting $K$ power constrained users is achieved by employing at most
$2N-1$ sequences. Analogously, the minimum received power (energy-per-chip) on
the symbol-synchronous CDMA system supporting $K$ users that demand specified
data rates is attained by employing at most $2N-1$ sequences. If there are $L$
oversized users in the system, at most $2N-L-1$ sequences are needed. $2N-1$ is
the minimum number of sequences needed to guarantee optimal allocation for
single dimensional signaling. $N$ orthogonal sequences are sufficient if a few
users (at most $N-1$) are allowed to signal in multiple dimensions. If there
are no oversized users, these split users need to signal only in two dimensions
each. The above results are shown by proving a converse to a well-known result
of Weyl on the interlacing eigenvalues of the sum of two Hermitian matrices,
one of which is of rank 1. The converse is analogous to Mirsky's converse to
the interlacing eigenvalues theorem for bordering matrices.
|
[
{
"version": "v1",
"created": "Sat, 3 Jun 2006 05:41:39 GMT"
},
{
"version": "v2",
"created": "Wed, 27 Feb 2008 10:19:03 GMT"
}
] | 2008-02-27T00:00:00 |
[
[
"Sundaresan",
"Rajesh",
""
],
[
"Padakandla",
"Arun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606016
|
Husheng Li
|
Husheng Li, Sharon M. Betz and H. Vincent Poor
|
Performance Analysis of Iterative Channel Estimation and Multiuser
Detection in Multipath DS-CDMA Channels
|
To appear in the IEEE Transactions on Signal Processing
| null |
10.1109/TSP.2007.893229
| null |
cs.IT math.IT
| null |
This paper examines the performance of decision feedback based iterative
channel estimation and multiuser detection in channel coded aperiodic DS-CDMA
systems operating over multipath fading channels. First, explicit expressions
describing the performance of channel estimation and parallel interference
cancellation based multiuser detection are developed. These results are then
combined to characterize the evolution of the performance of a system that
iterates among channel estimation, multiuser detection and channel decoding.
Sufficient conditions for convergence of this system to a unique fixed point
are developed.
|
[
{
"version": "v1",
"created": "Sun, 4 Jun 2006 16:46:52 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Li",
"Husheng",
""
],
[
"Betz",
"Sharon M.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606017
|
Victor Kryssanov
|
V.V. Kryssanov, K. Kakusho
|
From semiotics of hypermedia to physics of semiosis: A view from system
theory
|
46 pages, 5 figures; 2003 preprint
|
Semiotica. 2005, Vol.154-1/4, 11-38
| null | null |
cs.HC cs.CL cs.IT math.IT
| null |
Given that theoretical analysis and empirical validation is fundamental to
any model, whether conceptual or formal, it is surprising that these two tools
of scientific discovery are so often ignored in the contemporary studies of
communication. In this paper, we pursued the ideas of a) correcting and
expanding the modeling approaches of linguistics, which are otherwise
inapplicable (more precisely, which should not but are widely applied), to the
general case of hypermedia-based communication, and b) developing techniques
for empirical validation of semiotic models, which are nowadays routinely used
to explore (in fact, to conjecture about) internal mechanisms of complex
systems, yet on a purely speculative basis. This study thus offers two
experimentally tested substantive contributions: the formal representation of
communication as the mutually-orienting behavior of coupled autonomous systems,
and the mathematical interpretation of the semiosis of communication, which
together offer a concrete and parsimonious understanding of diverse
communication phenomena.
|
[
{
"version": "v1",
"created": "Mon, 5 Jun 2006 03:39:09 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Kakusho",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.HC",
"description": "Covers human factors, user interfaces, and collaborative computing. Roughly includes material in ACM Subject Classes H.1.2 and all of H.5, except for H.5.1, which is more likely to have Multimedia as the primary subject area.",
"span": "(Human-Computer Interaction)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606018
|
Matthias Bauer
|
Matthias Bauer and Benjamin Fabian and Matthias Fischmann and Seda
G\"urses
|
Emerging Markets for RFID Traces
|
submitted to WPES2006. Two figures are missing because of latex vs.
pdflatex incompatibilities
| null | null | null |
cs.CY cs.CR
| null |
RFID tags are held to become ubiquitous in logistics in the near future, and
item-level tagging will pave the way for Ubiquitous Computing, for example in
application fields like smart homes. Our paper addresses the value and the
production cost of information that can be gathered by observing these tags
over time and different locations. We argue that RFID technology will induce a
thriving market for such information, resulting in easy data access for
analysts to infer business intelligence and individual profiles of unusually
high detail. Understanding these information markets is important for many
reasons: They represent new business opportunities, and market players need to
be aware of their roles in these markets. Policy makers need to confirm that
the market structure will not negatively affect overall welfare. Finally,
though we are not addressing the complex issue of privacy, we are convinced
that market forces will have a significant impact on the effectiveness of
deployed security enhancements to RFID technology. In this paper we take a few
first steps into a relatively new field of economic research and conclude with
a list of research problems that promise deeper insights into the matter.
|
[
{
"version": "v1",
"created": "Mon, 5 Jun 2006 15:29:31 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Bauer",
"Matthias",
""
],
[
"Fabian",
"Benjamin",
""
],
[
"Fischmann",
"Matthias",
""
],
[
"Gürses",
"Seda",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606019
|
Roberto Amadio
|
Roberto Amadio (PPS)
|
A synchronous pi-calculus
| null |
Journal of Information and Computation 205, 9 (2007) 1470-1490
| null | null |
cs.LO cs.PL
| null |
The SL synchronous programming model is a relaxation of the Esterel
synchronous model where the reaction to the absence of a signal within an
instant can only happen at the next instant. In previous work, we have
revisited the SL synchronous programming model. In particular, we have
discussed an alternative design of the model including thread spawning and
recursive definitions, introduced a CPS translation to a tail recursive form,
and proposed a notion of bisimulation equivalence. In the present work, we
extend the tail recursive model with first-order data types obtaining a
non-deterministic synchronous model whose complexity is comparable to the one
of the pi-calculus. We show that our approach to bisimulation equivalence can
cope with this extension and in particular that labelled bisimulation can be
characterised as a contextual bisimulation.
|
[
{
"version": "v1",
"created": "Mon, 5 Jun 2006 16:46:41 GMT"
},
{
"version": "v2",
"created": "Fri, 9 Feb 2007 15:32:34 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Amadio",
"Roberto",
"",
"PPS"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606020
|
Vadim Astakhov
|
Vadim Astakhov, Tamara Astakhova, Brian Sanders
|
Imagination as Holographic Processor for Text Animation
|
10 pages, 10 figures, prototype presented at 4th International
Conference on Computer Science and its Applications (ICCSA-2006), paper
submited to SIGCHI 2007
| null | null | null |
cs.AI
| null |
Imagination is the critical point in developing of realistic artificial
intelligence (AI) systems. One way to approach imagination would be simulation
of its properties and operations. We developed two models: AI-Brain Network
Hierarchy of Languages and Semantical Holographic Calculus as well as
simulation system ScriptWriter that emulate the process of imagination through
an automatic animation of English texts. The purpose of this paper is to
demonstrate the model and to present ScriptWriter system
http://nvo.sdsc.edu/NVO/JCSG/get_SRB_mime_file2.cgi//home/tamara.sdsc/test/demo.zip?F=/home/tamara.sdsc/test/demo.zip&M=application/x-gtar
for simulation of the imagination.
|
[
{
"version": "v1",
"created": "Mon, 5 Jun 2006 23:55:37 GMT"
},
{
"version": "v2",
"created": "Wed, 10 Jan 2007 23:47:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Astakhov",
"Vadim",
""
],
[
"Astakhova",
"Tamara",
""
],
[
"Sanders",
"Brian",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606021
|
Victor Kryssanov
|
H. Tamaki, V.V. Kryssanov, S. Kitamura
|
A simulation engine to support production scheduling using
genetics-based machine learning
|
8 pages, 2 figures, 1 table. Preprint completed in 1998
|
In: K. Mertins, O. Krause, and B. Schallock (eds), Global
Production Management, pp. 482-489. 1999, Kluwer Academic Publishers
| null | null |
cs.CE cs.AI
| null |
The ever higher complexity of manufacturing systems, continually shortening
life cycles of products and their increasing variety, as well as the unstable
market situation of the recent years require introducing grater flexibility and
responsiveness to manufacturing processes. From this perspective, one of the
critical manufacturing tasks, which traditionally attract significant attention
in both academia and the industry, but which have no satisfactory universal
solution, is production scheduling. This paper proposes an approach based on
genetics-based machine learning (GBML) to treat the problem of flow shop
scheduling. By the approach, a set of scheduling rules is represented as an
individual of genetic algorithms, and the fitness of the individual is
estimated based on the makespan of the schedule generated by using the
rule-set. A concept of the interactive software environment consisting of a
simulator and a GBML simulation engine is introduced to support human
decision-making during scheduling. A pilot study is underway to evaluate the
performance of the GBML technique in comparison with other methods (such as
Johnson's algorithm and simulated annealing) while completing test examples.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 09:30:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Tamaki",
"H.",
""
],
[
"Kryssanov",
"V. V.",
""
],
[
"Kitamura",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606022
|
Kaibin Huang
|
Kaibin Huang, Robert W. Heath Jr, and Jeffrey G. Andrews
|
Limited Feedback Beamforming Over Temporally-Correlated Channels
|
31 pages; submitted to IEEE Transactions on Signal Processing
| null | null | null |
cs.IT math.IT
| null |
Feedback of quantized channel state information (CSI), called limited
feedback, enables transmit beamforming in multiple-input-multiple-output (MIMO)
wireless systems with a small amount of overhead. Due to its efficiency,
beamforming with limited feedback has been adopted in several wireless
communication standards. Prior work on limited feedback commonly adopts the
block fading channel model where temporal correlation in wireless channels is
neglected. This paper considers temporally-correlated channels and designs
single-user transmit beamforming with limited feedback. Analytical results
concerning CSI feedback are derived by modeling quantized CSI as a first-order
finite-state Markov chain. These results include the source bit rate generated
by time-varying quantized CSI, the required bit rate for a CSI feedback
channel, and the effect of feedback delay. In particular, based on the theory
of Markov chain convergence rate, feedback delay is proved to reduce the
throughput gain due to CSI feedback at least exponentially. Furthermore, an
algorithm is proposed for CSI feedback compression in time. Combining the
results in this work leads to a new method for designing limited feedback
beamforming as demonstrated by a design example.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 09:53:31 GMT"
},
{
"version": "v2",
"created": "Fri, 2 May 2008 04:47:53 GMT"
}
] | 2008-05-05T00:00:00 |
[
[
"Huang",
"Kaibin",
""
],
[
"Heath",
"Robert W.",
"Jr"
],
[
"Andrews",
"Jeffrey G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606023
|
Santanu Maiti Kumar
|
Santanu K. Maiti
|
Parallel Evaluation of Mathematica Programs in Remote Computers
Available in Network
|
10 pages, 1 figure. arXiv admin note: substantial text overlap with
arXiv:cs/0605090
| null | null | null |
cs.MS cs.PL
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Mathematica is a powerful application package for doing mathematics and is
used almost in all branches of science. It has widespread applications ranging
from quantum computation, statistical analysis, number theory, zoology,
astronomy, and many more. Mathematica gives a rich set of programming
extensions to its end-user language, and it permits us to write programs in
procedural, functional, or logic (rule-based) style, or a mixture of all three.
For tasks requiring interfaces to the external environment, mathematica
provides mathlink, which allows us to communicate mathematica programs with
external programs written in C, C++, F77, F90, F95, Java, or other languages.
It has also extensive capabilities for editing graphics, equations, text, etc.
In this article, we explore the basic mechanisms of parallelization of a
mathematica program by sharing different parts of the program into all other
computers available in the network. Doing the parallelization, we can perform
large computational operations within a very short period of time, and
therefore, the efficiency of the numerical works can be achieved. Parallel
computation supports any version of mathematica and it also works as well even
if different versions of mathematica are installed in different computers. The
whole operation can run under any supported operating system like Unix,
Windows, Macintosh, etc. Here we focus our study only for the Unix based
operating system, but this method works as well for all other cases.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 12:11:23 GMT"
},
{
"version": "v2",
"created": "Sun, 12 Oct 2008 09:01:20 GMT"
},
{
"version": "v3",
"created": "Fri, 17 Oct 2008 06:20:10 GMT"
}
] | 2015-10-29T00:00:00 |
[
[
"Maiti",
"Santanu K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.MS",
"description": "Roughly includes material in ACM Subject Class G.4.",
"span": "(Mathematical Software)"
},
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
}
] |
cs/0606024
|
Edgar Graaf de
|
Edgar de Graaf, Jeannette de Graaf, and Walter A. Kosters
|
Consecutive Support: Better Be Close!
|
10 pages
| null | null | null |
cs.AI cs.DB
| null |
We propose a new measure of support (the number of occur- rences of a
pattern), in which instances are more important if they occur with a certain
frequency and close after each other in the stream of trans- actions. We will
explain this new consecutive support and discuss how patterns can be found
faster by pruning the search space, for instance using so-called parent support
recalculation. Both consecutiveness and the notion of hypercliques are
incorporated into the Eclat algorithm. Synthetic examples show how interesting
phenomena can now be discov- ered in the datasets. The new measure can be
applied in many areas, ranging from bio-informatics to trade, supermarkets, and
even law en- forcement. E.g., in bio-informatics it is important to find
patterns con- tained in many individuals, where patterns close together in one
chro- mosome are more significant.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 14:28:42 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"de Graaf",
"Edgar",
""
],
[
"de Graaf",
"Jeannette",
""
],
[
"Kosters",
"Walter A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0606025
|
Xiaowen Zhang
|
Xiaowen Zhang, Li Shu, Ke Tang
|
A Chaotic Cipher Mmohocc and Its Security Analysis
|
14 pages, 4 figures, 4 tables
| null |
10.1117/12.717682
| null |
cs.CR
| null |
In this paper we introduce a new chaotic stream cipher Mmohocc which utilizes
the fundamental chaos characteristics. The designs of the major components of
the cipher are given. Its cryptographic properties of period, auto- and
cross-correlations, and the mixture of Markov processes and spatiotemporal
effects are investigated. The cipher is resistant to the related-key-IV
attacks, Time/Memory/Data tradeoff attacks, algebraic attacks, and chosen-text
attacks. The keystreams successfully passed two batteries of statistical tests
and the encryption speed is comparable with RC4.
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 17:42:56 GMT"
}
] | 2009-11-11T00:00:00 |
[
[
"Zhang",
"Xiaowen",
""
],
[
"Shu",
"Li",
""
],
[
"Tang",
"Ke",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606026
|
Ludo M.G.M. Tolhuizen
|
Henk D.L. Hollmann and Ludo M.G.M. Tolhuizen
|
Generating parity check equations for bounded-distance iterative erasure
decoding
|
Accepted for publication in Proc Int Symposium on Information Theory
2006, ISIT 06
| null | null | null |
cs.IT math.IT
| null |
A generic $(r,m)$-erasure correcting set is a collection of vectors in
$\bF_2^r$ which can be used to generate, for each binary linear code of
codimension $r$, a collection of parity check equations that enables iterative
decoding of all correctable erasure patterns of size at most $m$.
That is to say, the only stopping sets of size at most $m$ for the generated
parity check equations are the erasure patterns for which there is more than
one manner to fill in theerasures to obtain a codeword.
We give an explicit construction of generic $(r,m)$-erasure correcting sets
of cardinality $\sum_{i=0}^{m-1} {r-1\choose i}$. Using a random-coding-like
argument, we show that for fixed $m$, the minimum size of a generic
$(r,m)$-erasure correcting set is linear in $r$.
Keywords: iterative decoding, binary erasure channel, stopping set
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 18:03:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hollmann",
"Henk D. L.",
""
],
[
"Tolhuizen",
"Ludo M. G. M.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606027
|
Victor Kryssanov
|
V.V. Kryssanov, A.S. Kleshchev, Y. Fukuda, and K. Konishi
|
Building a logical model in the machining domain for CAPP expert systems
|
25 pages, 4 figures. Preprint completed in 1997
|
International Journal of Production Research, 1998, vol. 36, No.
4, 1075-1089
| null | null |
cs.AI cs.CE cs.SE
| null |
Recently, extensive efforts have been made on the application of expert
system technique to solving the process planning task in the machining domain.
This paper introduces a new formal method to design CAPP expert systems. The
formal method is applied to provide a contour of the CAPP expert system
building technology. Theoretical aspects of the formalism are described and
illustrated by an example of know-how analysis. Flexible facilities to utilize
multiple knowledge types and multiple planning strategies within one system are
provided by the technology.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 03:46:23 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Kleshchev",
"A. S.",
""
],
[
"Fukuda",
"Y.",
""
],
[
"Konishi",
"K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
cs/0606028
|
Evgenia Adutskevich
|
E.V. Adutskevich, S.V. Bakhanovich, N.A. Likhoded
|
Affine Transformations of Loop Nests for Parallel Execution and
Distribution of Data over Processors
|
9 pages
|
Preprint / The National Academy of Sciences of Belarus. Institute
of Mathematics: N 3 (574). Minsk, 2005
| null | null |
cs.DC
| null |
The paper is devoted to the problem of mapping affine loop nests onto
distributed memory parallel computers. A method to find affine transformations
of loop nests for parallel execution and distribution of data over processors
is presented. The method tends to minimize the number of communications between
processors and to improve locality of data within one processor. A problem of
determination of data exchange sequence is investigated. Conditions to
determine the ability to arrange broadcast is presented.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 12:59:49 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Adutskevich",
"E. V.",
""
],
[
"Bakhanovich",
"S. V.",
""
],
[
"Likhoded",
"N. A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0606029
|
Audun Josang
|
Audun Josang
|
Belief Calculus
|
22 pages, 10 figures
| null | null | null |
cs.AI
| null |
In Dempster-Shafer belief theory, general beliefs are expressed as belief
mass distribution functions over frames of discernment. In Subjective Logic
beliefs are expressed as belief mass distribution functions over binary frames
of discernment. Belief representations in Subjective Logic, which are called
opinions, also contain a base rate parameter which express the a priori belief
in the absence of evidence. Philosophically, beliefs are quantitative
representations of evidence as perceived by humans or by other intelligent
agents. The basic operators of classical probability calculus, such as addition
and multiplication, can be applied to opinions, thereby making belief calculus
practical. Through the equivalence between opinions and Beta probability
density functions, this also provides a calculus for Beta probability density
functions. This article explains the basic elements of belief calculus.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:32:55 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Josang",
"Audun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606030
|
Heinrich Hordegen
|
V\'eronique Cortier (INRIA Lorraine - LORIA / LIFC), Heinrich
H\"ordegen (INRIA Lorraine - LORIA / LIFC), Bogdan Warinschi (INRIA Lorraine
- LORIA / LIFC)
|
Explicit Randomness is not Necessary when Modeling Probabilistic
Encryption
| null | null | null | null |
cs.CR
| null |
Although good encryption functions are probabilistic, most symbolic models do
not capture this aspect explicitly. A typical solution, recently used to prove
the soundness of such models with respect to computational ones, is to
explicitly represent the dependency of ciphertexts on random coins as labels.
In order to make these label-based models useful, it seems natural to try to
extend the underlying decision procedures and the implementation of existing
tools. In this paper we put forth a more practical alternative based on the
following soundness theorem. We prove that for a large class of security
properties (that includes rather standard formulations for secrecy and
authenticity properties), security of protocols in the simpler model implies
security in the label-based model. Combined with the soundness result of
(\textbf{?}) our theorem enables the translation of security results in
unlabeled symbolic models to computational security.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:42:34 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Cortier",
"Véronique",
"",
"INRIA Lorraine - LORIA / LIFC"
],
[
"Hördegen",
"Heinrich",
"",
"INRIA Lorraine - LORIA / LIFC"
],
[
"Warinschi",
"Bogdan",
"",
"INRIA Lorraine\n - LORIA / LIFC"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606031
|
Guillaume Moroz
|
Guillaume Moroz (LIP6, INRIA Rocquencourt)
|
Complexity of Resolution of Parametric Systems of Polynomial Equations
and Inequations
| null | null | null | null |
cs.SC
| null |
Consider a system of n polynomial equations and r polynomial inequations in n
indeterminates of degree bounded by d with coefficients in a polynomial ring of
s parameters with rational coefficients of bit-size at most $\sigma$. From the
real viewpoint, solving such a system often means describing some
semi-algebraic sets in the parameter space over which the number of real
solutions of the considered parametric system is constant. Following the works
of Lazard and Rouillier, this can be done by the computation of a discriminant
variety. In this report we focus on the case where for a generic specialization
of the parameters the system of equations generates a radical zero-dimensional
ideal, which is usual in the applications. In this case, we provide a
deterministic method computing the minimal discriminant variety reducing the
problem to a problem of elimination. Moreover, we prove that the degree of the
computed minimal discriminant variety is bounded by $D:=(n+r)d^{(n+1)}$ and
that the complexity of our method is $\sigma^{\mathcal{O}(1)}
D^{\mathcal{O}(n+s)}$ bit-operations on a deterministic Turing machine.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 14:44:53 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Moroz",
"Guillaume",
"",
"LIP6, INRIA Rocquencourt"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
}
] |
cs/0606032
|
Andreas U. Schmidt
|
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
|
A secure archive for Voice-over-IP conversations
|
9 pages, 2 figures. (C) ACM, (2006). This is the author's version of
the work. It is posted here by permission of ACM for your personal use. Not
for redistribution. The definitive version was published in Proceedings of
VSW06, June, 2006, Berlin, Germany
| null | null | null |
cs.CR
| null |
An efficient archive securing the integrity of VoIP-based two-party
conversations is presented. The solution is based on chains of hashes and
continuously chained electronic signatures. Security is concentrated in a
single, efficient component, allowing for a detailed analysis.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 17:04:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606033
|
Michael Stay
|
Cristian S. Calude and Michael A. Stay
|
Natural Halting Probabilities, Partial Randomness, and Zeta Functions
|
Accepted for publication in Information and Computing
| null | null |
CDMTCS 273
|
cs.CC
| null |
We introduce the zeta number, natural halting probability and natural
complexity of a Turing machine and we relate them to Chaitin's Omega number,
halting probability, and program-size complexity. A classification of Turing
machines according to their zeta numbers is proposed: divergent, convergent and
tuatara. We prove the existence of universal convergent and tuatara machines.
Various results on (algorithmic) randomness and partial randomness are proved.
For example, we show that the zeta number of a universal tuatara machine is
c.e. and random. A new type of partial randomness, asymptotic randomness, is
introduced. Finally we show that in contrast to classical (algorithmic)
randomness--which cannot be naturally characterised in terms of plain
complexity--asymptotic randomness admits such a characterisation.
|
[
{
"version": "v1",
"created": "Wed, 7 Jun 2006 20:18:13 GMT"
},
{
"version": "v2",
"created": "Tue, 11 Jul 2006 21:35:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Calude",
"Cristian S.",
""
],
[
"Stay",
"Michael A.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606034
|
Teddy Furon
|
Teddy Furon (IRISA)
|
A constructive and unifying framework for zero-bit watermarking
|
submitted to IEEE Trans. on Information Forensics and Security
| null | null | null |
cs.MM cs.CR
| null |
In the watermark detection scenario, also known as zero-bit watermarking, a
watermark, carrying no hidden message, is inserted in content. The watermark
detector checks for the presence of this particular weak signal in content. The
article looks at this problem from a classical detection theory point of view,
but with side information enabled at the embedding side. This means that the
watermark signal is a function of the host content. Our study is twofold. The
first step is to design the best embedding function for a given detection
function, and the best detection function for a given embedding function. This
yields two conditions, which are mixed into one `fundamental' partial
differential equation. It appears that many famous watermarking schemes are
indeed solution to this `fundamental' equation. This study thus gives birth to
a constructive framework unifying solutions, so far perceived as very
different.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2006 13:28:07 GMT"
},
{
"version": "v2",
"created": "Fri, 12 Jan 2007 13:11:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Furon",
"Teddy",
"",
"IRISA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.MM",
"description": "Roughly includes material in ACM Subject Class H.5.1.",
"span": "(Multimedia)"
},
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606035
|
Sergei Fedorenko
|
Sergei V. Fedorenko, Piter V. Trifonov
|
Finding roots of polynomials over finite fields
|
6 pages. IEEE Transactions on Communications
|
IEEE Transactions on Communications, Volume 50, Issue 11, Nov.
2002, Pages:1709 - 1711
|
10.1109/TCOMM.2002.805269
| null |
cs.IT math.IT
| null |
We propose an improved algorithm for finding roots of polynomials over finite
fields. This makes possible significant speedup of the decoding process of
Bose-Chaudhuri-Hocquenghem, Reed-Solomon, and some other error-correcting
codes.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2006 14:41:54 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Fedorenko",
"Sergei V.",
""
],
[
"Trifonov",
"Piter V.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606036
|
M. H. van Emden
|
M.H. van Emden and B. Moa
|
Computational Euclid
|
8 pages, 3 figures
| null | null |
DCS-315-IR
|
cs.CG
| null |
We analyse the axioms of Euclidean geometry according to standard
object-oriented software development methodology. We find a perfect match: the
main undefined concepts of the axioms translate to object classes. The result
is a suite of C++ classes that efficiently supports the construction of complex
geometric configurations. Although all computations are performed in
floating-point arithmetic, they correctly implement as semi-decision algorithms
the tests for equality of points, a point being on a line or in a plane, a line
being in a plane, parallelness of lines, of a line and a plane, and of planes.
That is, in accordance to the fundamental limitations to computability
requiring that only negative outcomes are given with certainty, while positive
outcomes only imply possibility of these conditions being true.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2006 15:43:09 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"van Emden",
"M. H.",
""
],
[
"Moa",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0606037
|
Luca Trevisan
|
Andrej Bogdanov and Luca Trevisan
|
Average-Case Complexity
| null | null | null | null |
cs.CC
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
We survey the average-case complexity of problems in NP.
We discuss various notions of good-on-average algorithms, and present
completeness results due to Impagliazzo and Levin. Such completeness results
establish the fact that if a certain specific (but somewhat artificial) NP
problem is easy-on-average with respect to the uniform distribution, then all
problems in NP are easy-on-average with respect to all samplable distributions.
Applying the theory to natural distributional problems remain an outstanding
open question. We review some natural distributional problems whose
average-case complexity is of particular interest and that do not yet fit into
this theory.
A major open question whether the existence of hard-on-average problems in NP
can be based on the P$\neq$NP assumption or on related worst-case assumptions.
We review negative results showing that certain proof techniques cannot prove
such a result. While the relation between worst-case and average-case
complexity for general NP problems remains open, there has been progress in
understanding the relation between different "degrees" of average-case
complexity. We discuss some of these "hardness amplification" results.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2006 18:40:21 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 20:20:22 GMT"
},
{
"version": "v3",
"created": "Tue, 17 Aug 2021 09:39:06 GMT"
}
] | 2021-08-18T00:00:00 |
[
[
"Bogdanov",
"Andrej",
""
],
[
"Trevisan",
"Luca",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606038
|
Shripad Thite
|
Shripad Thite
|
Tight Bounds on the Complexity of Recognizing Odd-Ranked Elements
|
3 pages
| null | null | null |
cs.CC cs.DS
| null |
Let S = <s_1, s_2, s_3, ..., s_n> be a given vector of n real numbers. The
rank of a real z with respect to S is defined as the number of elements s_i in
S such that s_i is less than or equal to z. We consider the following decision
problem: determine whether the odd-numbered elements s_1, s_3, s_5, ... are
precisely the elements of S whose rank with respect to S is odd. We prove a
bound of Theta(n log n) on the number of operations required to solve this
problem in the algebraic computation tree model.
|
[
{
"version": "v1",
"created": "Thu, 8 Jun 2006 21:28:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Thite",
"Shripad",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606039
|
Victor Kryssanov
|
V.V. Kryssanov, H. Tamaki, S. Kitamura
|
Evolutionary Design: Philosophy, Theory, and Application Tactics
|
6 pages, 3 figures. Preprint completed in 1999
|
CIRP Journal of Manufacturing Systems, 2005, Vol. 34/2
| null | null |
cs.CE cs.AI
| null |
Although it has contributed to remarkable improvements in some specific
areas, attempts to develop a universal design theory are generally
characterized by failure. This paper sketches arguments for a new approach to
engineering design based on Semiotics - the science about signs. The approach
is to combine different design theories over all the product life cycle stages
into one coherent and traceable framework. Besides, it is to bring together the
designer's and user's understandings of the notion of 'good product'. Building
on the insight from natural sciences that complex systems always exhibit a
self-organizing meaning-influential hierarchical dynamics, objective laws
controlling product development are found through an examination of design as a
semiosis process. These laws are then applied to support evolutionary design of
products. An experiment validating some of the theoretical findings is
outlined, and concluding remarks are given.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 08:00:37 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kryssanov",
"V. V.",
""
],
[
"Tamaki",
"H.",
""
],
[
"Kitamura",
"S.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CE",
"description": "Covers applications of computer science to the mathematical modeling of complex systems in the fields of science, engineering, and finance. Papers here are interdisciplinary and applications-oriented, focusing on techniques and tools that enable challenging computational simulations to be performed, for which the use of supercomputers or distributed computing platforms is often required. Includes material in ACM Subject Classes J.2, J.3, and J.4 (economics).",
"span": "(Computational Engineering, Finance, and Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606040
|
Bodo Manthey
|
Bodo Manthey, L. Shankar Ram
|
Approximation Algorithms for Multi-Criteria Traveling Salesman Problems
|
To appear in Algorithmica. A preliminary version has been presented
at the 4th Workshop on Approximation and Online Algorithms (WAOA 2006)
| null | null | null |
cs.DS cs.CC
| null |
In multi-criteria optimization problems, several objective functions have to
be optimized. Since the different objective functions are usually in conflict
with each other, one cannot consider only one particular solution as the
optimal solution. Instead, the aim is to compute a so-called Pareto curve of
solutions. Since Pareto curves cannot be computed efficiently in general, we
have to be content with approximations to them.
We design a deterministic polynomial-time algorithm for multi-criteria
g-metric STSP that computes (min{1 +g, 2g^2/(2g^2 -2g +1)} + eps)-approximate
Pareto curves for all 1/2<=g<=1. In particular, we obtain a
(2+eps)-approximation for multi-criteria metric STSP. We also present two
randomized approximation algorithms for multi-criteria g-metric STSP that
achieve approximation ratios of (2g^3 +2g^2)/(3g^2 -2g +1) + eps and (1 +g)/(1
+3g -4g^2) + eps, respectively.
Moreover, we present randomized approximation algorithms for multi-criteria
g-metric ATSP (ratio 1/2 + g^3/(1 -3g^2) + eps) for g < 1/sqrt(3)), STSP with
weights 1 and 2 (ratio 4/3) and ATSP with weights 1 and 2 (ratio 3/2). To do
this, we design randomized approximation schemes for multi-criteria cycle cover
and graph factor problems.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 11:41:53 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2006 15:16:04 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Aug 2007 13:12:04 GMT"
}
] | 2009-09-29T00:00:00 |
[
[
"Manthey",
"Bodo",
""
],
[
"Ram",
"L. Shankar",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606041
|
Ming-Zhe Chen
|
Ming-Zhe Chen
|
Characterization of Pentagons Determined by Two X-rays
|
4 pages, 2 figures
| null | null | null |
cs.CG
| null |
This paper contains some results of pentagons which can be determined by two
X-rays. The results reveal this problem is more complicated.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 14:13:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chen",
"Ming-Zhe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
}
] |
cs/0606042
|
Laurent Hascoet
|
Laurent Hascoet (INRIA Sophia Antipolis), Mauricio Araya-Polo (INRIA
Sophia Antipolis)
|
Enabling user-driven Checkpointing strategies in Reverse-mode Automatic
Differentiation
| null | null | null | null |
cs.DS
| null |
This paper presents a new functionality of the Automatic Differentiation (AD)
tool Tapenade. Tapenade generates adjoint codes which are widely used for
optimization or inverse problems. Unfortunately, for large applications the
adjoint code demands a great deal of memory, because it needs to store a large
set of intermediates values. To cope with that problem, Tapenade implements a
sub-optimal version of a technique called checkpointing, which is a trade-off
between storage and recomputation. Our long-term goal is to provide an optimal
checkpointing strategy for every code, not yet achieved by any AD tool. Towards
that goal, we first introduce modifications in Tapenade in order to give the
user the choice to select the checkpointing strategy most suitable for their
code. Second, we conduct experiments in real-size scientific codes in order to
gather hints that help us to deduce an optimal checkpointing strategy. Some of
the experimental results show memory savings up to 35% and execution time up to
90%.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:01:46 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hascoet",
"Laurent",
"",
"INRIA Sophia Antipolis"
],
[
"Araya-Polo",
"Mauricio",
"",
"INRIA\n Sophia Antipolis"
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606043
|
Pierre Lopez
|
Christian Artigues (LIA), Pierre Lopez (LAAS), Pierre-Dimitri Ayache
(LIA)
|
Schedule generation schemes for the job-shop problem with
sequence-dependent setup times: dominance properties and computational
analysis
| null |
Annals of Operations Research 138 (2005) 21-52
| null | null |
cs.CC math.CO
| null |
We consider the job-shop problem with sequence-dependent setup times. We
focus on the formal definition of schedule generation schemes (SGSs) based on
the semi-active, active, and non-delay schedule categories. We study dominance
properties of the sets of schedules obtainable with each SGS. We show how the
proposed SGSs can be used within single-pass and multi-pass priority rule based
heuristics. We study several priority rules for the problem and provide a
comparative computational analysis of the different SGSs on sets of instances
taken from the literature. The proposed SGSs significantly improve previously
best-known results on a set of hard benchmark instances.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 16:32:20 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Artigues",
"Christian",
"",
"LIA"
],
[
"Lopez",
"Pierre",
"",
"LAAS"
],
[
"Ayache",
"Pierre-Dimitri",
"",
"LIA"
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0606044
|
Edith Elkind
|
Edith Elkind, Leslie Ann Goldberg, Paul W. Goldberg
|
Frugality ratios and improved truthful mechanisms for vertex cover
|
26 pages, 5 figures (minor revision of the previous version)
| null | null | null |
cs.GT
| null |
In {\em set-system auctions}, there are several overlapping teams of agents,
and a task that can be completed by any of these teams. The buyer's goal is to
hire a team and pay as little as possible. Recently, Karlin, Kempe and Tamir
introduced a new definition of {\em frugality ratio} for this setting.
Informally, the frugality ratio is the ratio of the total payment of a
mechanism to perceived fair cost. In this paper, we study this together with
alternative notions of fair cost, and how the resulting frugality ratios relate
to each other for various kinds of set systems.
We propose a new truthful polynomial-time auction for the vertex cover
problem (where the feasible sets correspond to the vertex covers of a given
graph), based on the {\em local ratio} algorithm of Bar-Yehuda and Even. The
mechanism guarantees to find a winning set whose cost is at most twice the
optimal. In this situation, even though it is NP-hard to find a lowest-cost
feasible set, we show that {\em local optimality} of a solution can be used to
derive frugality bounds that are within a constant factor of best possible. To
prove this result, we use our alternative notions of frugality via a
bootstrapping technique, which may be of independent interest.
|
[
{
"version": "v1",
"created": "Fri, 9 Jun 2006 20:48:31 GMT"
},
{
"version": "v2",
"created": "Sun, 16 Jul 2006 21:23:42 GMT"
},
{
"version": "v3",
"created": "Wed, 26 Jul 2006 17:09:50 GMT"
},
{
"version": "v4",
"created": "Mon, 23 Jul 2007 17:25:03 GMT"
}
] | 2007-07-23T00:00:00 |
[
[
"Elkind",
"Edith",
""
],
[
"Goldberg",
"Leslie Ann",
""
],
[
"Goldberg",
"Paul W.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0606045
|
Andreas U. Schmidt
|
Nicolai Kuntze and Andreas U. Schmidt
|
Trusted Computing in Mobile Action
|
In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa
| null | null | null |
cs.CR
| null |
Due to the convergence of various mobile access technologies like UMTS, WLAN,
and WiMax the need for a new supporting infrastructure arises. This
infrastructure should be able to support more efficient ways to authenticate
users and devices, potentially enabling novel services based on the security
provided by the infrastructure. In this paper we exhibit some usage scenarios
from the mobile domain integrating trusted computing, which show that trusted
computing offers new paradigms for implementing trust and by this enables new
technical applications and business scenarios. The scenarios show how the
traditional boundaries between technical and authentication domains become
permeable while a high security level is maintained.
|
[
{
"version": "v1",
"created": "Sat, 10 Jun 2006 09:52:05 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606046
|
Andreas U. Schmidt
|
Jan Piechalski and Andreas U. Schmidt
|
Authorised Translations of Electronic Documents
|
In: Peer-reviewed Proceedings of the Information Security South
Africa (ISSA) 2006 From Insight to Foresight Conference, 5 to 7 July 2006,
Sandton, South Africa
| null | null | null |
cs.OH
| null |
A concept is proposed to extend authorised translations of documents to
electronically signed, digital documents. Central element of the solution is an
electronic seal, embodied as an XML data structure, which attests to the
correctness of the translation and the authorisation of the translator. The
seal contains a digital signature binding together original and translated
document, thus enabling forensic inspection and therefore legal security in the
appropriation of the translation. Organisational aspects of possible
implementation variants of electronic authorised translations are discussed and
a realisation as a stand-alone web-service is presented.
|
[
{
"version": "v1",
"created": "Sat, 10 Jun 2006 10:37:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Piechalski",
"Jan",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.OH",
"description": "This is the classification to use for documents that do not fit anywhere else.",
"span": "(Other Computer Science)"
}
] |
cs/0606047
|
Giorgos Kollias
|
Giorgos Kollias, Efstratios Gallopoulos, Daniel B. Szyld
|
Asynchronous iterative computations with Web information retrieval
structures: The PageRank case
|
8 pages to appear at ParCo2005 Conference Proceedings
| null | null |
TR HPCLAB-SCG 5/08-05
|
cs.DC
| null |
There are several ideas being used today for Web information retrieval, and
specifically in Web search engines. The PageRank algorithm is one of those that
introduce a content-neutral ranking function over Web pages. This ranking is
applied to the set of pages returned by the Google search engine in response to
posting a search query. PageRank is based in part on two simple common sense
concepts: (i)A page is important if many important pages include links to it.
(ii)A page containing many links has reduced impact on the importance of the
pages it links to. In this paper we focus on asynchronous iterative schemes to
compute PageRank over large sets of Web pages. The elimination of the
synchronizing phases is expected to be advantageous on heterogeneous platforms.
The motivation for a possible move to such large scale distributed platforms
lies in the size of matrices representing Web structure. In orders of
magnitude: $10^{10}$ pages with $10^{11}$ nonzero elements and $10^{12}$ bytes
just to store a small percentage of the Web (the already crawled); distributed
memory machines are necessary for such computations. The present research is
part of our general objective, to explore the potential of asynchronous
computational models as an underlying framework for very large scale
computations over the Grid. The area of ``internet algorithmics'' appears to
offer many occasions for computations of unprecedent dimensionality that would
be good candidates for this framework.
|
[
{
"version": "v1",
"created": "Sun, 11 Jun 2006 09:36:26 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kollias",
"Giorgos",
""
],
[
"Gallopoulos",
"Efstratios",
""
],
[
"Szyld",
"Daniel B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0606048
|
Rudi Cilibrasi
|
Rudi Cilibrasi and Paul M.B. Vitanyi
|
A New Quartet Tree Heuristic for Hierarchical Clustering
|
22 pages, 14 figures
| null | null | null |
cs.DS cs.CV cs.DM math.ST physics.data-an q-bio.QM stat.TH
| null |
We consider the problem of constructing an an optimal-weight tree from the
3*(n choose 4) weighted quartet topologies on n objects, where optimality means
that the summed weight of the embedded quartet topologiesis optimal (so it can
be the case that the optimal tree embeds all quartets as non-optimal
topologies). We present a heuristic for reconstructing the optimal-weight tree,
and a canonical manner to derive the quartet-topology weights from a given
distance matrix. The method repeatedly transforms a bifurcating tree, with all
objects involved as leaves, achieving a monotonic approximation to the exact
single globally optimal tree. This contrasts to other heuristic search methods
from biological phylogeny, like DNAML or quartet puzzling, which, repeatedly,
incrementally construct a solution from a random order of objects, and
subsequently add agreement values.
|
[
{
"version": "v1",
"created": "Sun, 11 Jun 2006 16:05:51 GMT"
}
] | 2011-11-09T00:00:00 |
[
[
"Cilibrasi",
"Rudi",
""
],
[
"Vitanyi",
"Paul M. B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
},
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.ST",
"description": "Applied, computational and theoretical statistics: e.g. statistical inference, regression, time series, multivariate analysis, data analysis, Markov chain Monte Carlo, design of experiments, case studies",
"span": "(Statistics Theory)"
},
{
"class": "Physics",
"code": "physics.data-an",
"description": "Methods, software and hardware for physics data analysis: data processing and storage; measurement methodology; statistical and mathematical aspects such as parametrization and uncertainties.",
"span": "(Data Analysis, Statistics and Probability)"
},
{
"class": "Quantitative Biology",
"code": "q-bio.QM",
"description": "All experimental, numerical, statistical and mathematical contributions of value to biology",
"span": "(Quantitative Methods)"
},
{
"class": "Statistics",
"code": "stat.TH",
"description": "stat.TH is an alias for math.ST. Asymptotics, Bayesian Inference, Decision Theory, Estimation, Foundations, Inference, Testing.",
"span": "(Statistics Theory)"
}
] |
cs/0606049
|
Alexandros Dimakis
|
Alexandros G. Dimakis, Vinod Prabhakaran, Kannan Ramchandran
|
Decentralized Erasure Codes for Distributed Networked Storage
|
to appear in IEEE Transactions on Information Theory, Special Issue:
Networking and Information Theory
| null |
10.1109/TIT.2006.874535
| null |
cs.IT cs.NI math.IT
| null |
We consider the problem of constructing an erasure code for storage over a
network when the data sources are distributed. Specifically, we assume that
there are n storage nodes with limited memory and k<n sources generating the
data. We want a data collector, who can appear anywhere in the network, to
query any k storage nodes and be able to retrieve the data. We introduce
Decentralized Erasure Codes, which are linear codes with a specific randomized
structure inspired by network coding on random bipartite graphs. We show that
decentralized erasure codes are optimally sparse, and lead to reduced
communication, storage and computation cost over random linear coding.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 15:35:01 GMT"
}
] | 2016-11-15T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Prabhakaran",
"Vinod",
""
],
[
"Ramchandran",
"Kannan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606050
|
Prabhu Manyem
|
Prabhu Manyem
|
Syntactic Characterisations of Polynomial-Time Optimisation Classes
(Syntactic Characterizations of Polynomial-Time Optimization Classes)
|
17 pages; presented at the July 2005 ACiD workshop at Durham,
England; Included both American and British commonwealth spellings, so as to
generate hits from readers in North America as well as from Commonwealth
countries and Europe
| null | null | null |
cs.CC cs.LO
| null |
In Descriptive Complexity, there is a vast amount of literature on decision
problems, and their classes such as \textbf{P, NP, L and NL}. ~ However,
research on the descriptive complexity of optimisation problems has been
limited. Optimisation problems corresponding to the \textbf{NP} class have been
characterised in terms of logic expressions by Papadimitriou and Yannakakis,
Panconesi and Ranjan, Kolaitis and Thakur, Khanna et al, and by Zimand.
Gr\"{a}del characterised the polynomial class \textbf{P} of decision problems.
In this paper, we attempt to characterise the optimisation versions of
\textbf{P} via expressions in second order logic, many of them using universal
Horn formulae with successor relations. The polynomially bound versions of
maximisation (maximization) and minimisation (minimization) problems are
treated first, and then the maximisation problems in the "not necessarily
polynomially bound" class.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 00:42:29 GMT"
},
{
"version": "v2",
"created": "Fri, 6 Oct 2006 23:49:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Manyem",
"Prabhu",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606051
|
Shu-Tao Xia
|
Shu-Tao Xia, Fang-Wei Fu
|
Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes
|
17 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
In this correspondence, we study the minimum pseudo-weight and minimum
pseudo-codewords of low-density parity-check (LDPC) codes under linear
programming (LP) decoding. First, we show that the lower bound of Kelly,
Sridhara, Xu and Rosenthal on the pseudo-weight of a pseudo-codeword of an LDPC
code with girth greater than 4 is tight if and only if this pseudo-codeword is
a real multiple of a codeword. Then, we show that the lower bound of Kashyap
and Vardy on the stopping distance of an LDPC code is also a lower bound on the
pseudo-weight of a pseudo-codeword of this LDPC code with girth 4, and this
lower bound is tight if and only if this pseudo-codeword is a real multiple of
a codeword. Using these results we further show that for some LDPC codes, there
are no other minimum pseudo-codewords except the real multiples of minimum
codewords. This means that the LP decoding for these LDPC codes is
asymptotically optimal in the sense that the ratio of the probabilities of
decoding errors of LP decoding and maximum-likelihood decoding approaches to 1
as the signal-to-noise ratio leads to infinity. Finally, some LDPC codes are
listed to illustrate these results.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 05:12:10 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Nov 2006 14:07:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Xia",
"Shu-Tao",
""
],
[
"Fu",
"Fang-Wei",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606052
|
Jos\'e M. F. Moura
|
Soummya Kar, Saeed Aldosari and Jos\'e M. F. Moura
|
Topology for Distributed Inference on Graphs
|
Submitted for Journal publication
| null | null | null |
cs.IT math.IT
| null |
Let $N$ local decision makers in a sensor network communicate with their
neighbors to reach a decision \emph{consensus}. Communication is local, among
neighboring sensors only, through noiseless or noisy links. We study the design
of the network topology that optimizes the rate of convergence of the iterative
decision consensus algorithm. We reformulate the topology design problem as a
spectral graph design problem, namely, maximizing the eigenratio~$\gamma$ of
two eigenvalues of the graph Laplacian~$L$, a matrix that is naturally
associated with the interconnectivity pattern of the network. This
reformulation avoids costly Monte Carlo simulations and leads to the class of
non-bipartite Ramanujan graphs for which we find a lower bound on~$\gamma$. For
Ramanujan topologies and noiseless links, the local probability of error
converges much faster to the overall global probability of error than for
structured graphs, random graphs, or graphs exhibiting small-world
characteristics. With noisy links, we determine the optimal number of
iterations before calling a decision. Finally, we introduce a new class of
random graphs that are easy to construct, can be designed with arbitrary number
of sensors, and whose spectral and convergence properties make them practically
equivalent to Ramanujan topologies.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 17:32:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kar",
"Soummya",
""
],
[
"Aldosari",
"Saeed",
""
],
[
"Moura",
"José M. F.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606053
|
Antoine Meyer
|
Arnaud Carayol and Antoine Meyer
|
Context-Sensitive Languages, Rational Graphs and Determinism
| null |
Logical Methods in Computer Science, Volume 2, Issue 2 (July 19,
2006) lmcs:2254
|
10.2168/LMCS-2(2:6)2006
| null |
cs.LO
| null |
We investigate families of infinite automata for context-sensitive languages.
An infinite automaton is an infinite labeled graph with two sets of initial and
final vertices. Its language is the set of all words labelling a path from an
initial vertex to a final vertex. In 2001, Morvan and Stirling proved that
rational graphs accept the context-sensitive languages between rational sets of
initial and final vertices. This result was later extended to sub-families of
rational graphs defined by more restricted classes of transducers.
languages.<br><br>
Our contribution is to provide syntactical and self-contained proofs of the
above results, when earlier constructions relied on a non-trivial normal form
of context-sensitive grammars defined by Penttonen in the 1970's. These new
proof techniques enable us to summarize and refine these results by considering
several sub-families defined by restrictions on the type of transducers, the
degree of the graph or the size of the set of initial vertices.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 09:35:18 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jul 2006 11:45:45 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Carayol",
"Arnaud",
""
],
[
"Meyer",
"Antoine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606054
|
Qiming Lu
|
Qiming Lu, Gyorgy Korniss, Boleslaw K. Szymanski
|
Threshold-Controlled Global Cascading in Wireless Sensor Networks
| null |
Proceeding of third International Conference on Networked Sensing
Systems, 164-171 (TRF, 2006)
| null | null |
cs.NI
| null |
We investigate cascade dynamics in threshold-controlled (multiplex)
propagation on random geometric networks. We find that such local dynamics can
serve as an efficient, robust, and reliable prototypical activation protocol in
sensor networks in responding to various alarm scenarios. We also consider the
same dynamics on a modified network by adding a few long-range communication
links, resulting in a small-world network. We find that such construction can
further enhance and optimize the speed of the network's response, while keeping
energy consumption at a manageable level.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 19:30:50 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Lu",
"Qiming",
""
],
[
"Korniss",
"Gyorgy",
""
],
[
"Szymanski",
"Boleslaw K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0606055
|
Jean Gallier
|
Jean Gallier
|
Simple Methods For Drawing Rational Surfaces as Four or Six Bezier
Patches
|
33 pages
| null | null | null |
cs.CG cs.GR
| null |
In this paper, we give several simple methods for drawing a whole rational
surface (without base points) as several Bezier patches. The first two methods
apply to surfaces specified by triangular control nets and partition the real
projective plane RP2 into four and six triangles respectively. The third method
applies to surfaces specified by rectangular control nets and partitions the
torus RP1 X RP1 into four rectangular regions. In all cases, the new control
nets are obtained by sign flipping and permutation of indices from the original
control net. The proofs that these formulae are correct involve very little
computations and instead exploit the geometry of the parameter space (RP2 or
RP1 X RP1). We illustrate our method on some classical examples. We also
propose a new method for resolving base points using a simple ``blowing up''
technique involving the computation of ``resolved'' control nets.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 22:02:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gallier",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0606056
|
Jean Gallier
|
Jean Gallier and Weqing Gu
|
Fast and Simple Methods For Computing Control Points
|
15 pages
| null | null | null |
cs.CC cs.GR
| null |
The purpose of this paper is to present simple and fast methods for computing
control points for polynomial curves and polynomial surfaces given explicitly
in terms of polynomials (written as sums of monomials). We give recurrence
formulae w.r.t. arbitrary affine frames. As a corollary, it is amusing that we
can also give closed-form expressions in the case of the frame (r, s) for
curves, and the frame ((1, 0, 0), (0, 1, 0), (0, 0, 1) for surfaces. Our
methods have the same low polynomial (time and space) complexity as the other
best known algorithms, and are very easy to implement.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 00:47:34 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gallier",
"Jean",
""
],
[
"Gu",
"Weqing",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0606057
|
Fredrik Kuivinen
|
Fredrik Kuivinen
|
Approximability of Bounded Occurrence Max Ones
|
Accepted to MFCS 2006
| null | null | null |
cs.CC
| null |
We study the approximability of Max Ones when the number of variable
occurrences is bounded by a constant. For conservative constraint languages
(i.e., when the unary relations are included) we give a complete classification
when the number of occurrences is three or more and a partial classification
when the bound is two.
For the non-conservative case we prove that it is either trivial or
equivalent to the corresponding conservative problem under polynomial-time
many-one reductions.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 06:44:21 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Kuivinen",
"Fredrik",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606058
|
Philippe Chapdelaine
|
Philippe Chapdelaine, Etienne Grandjean
|
Lower bounds and complete problems in nondeterministic linear time and
sublinear space complexity classes
|
19 pages, 4 figures
| null | null | null |
cs.CC cs.LO
| null |
Proving lower bounds remains the most difficult of tasks in computational
complexity theory. In this paper, we show that whereas most natural NP-complete
problems belong to NLIN (linear time on nondeterministic RAMs), some of them,
typically the planar versions of many NP-complete problems are recognized by
nondeterministic RAMs in linear time and sublinear space. The main results of
this paper are the following: as the second author did for NLIN, we give exact
logical characterizations of nondeterministic polynomial time-space complexity
classes; we derive from them a class of problems, which are complete in these
classes, and as a consequence of such a precise result and of some recent
separation theorems using diagonalization, prove time-space lower bounds for
these problems.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 08:10:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chapdelaine",
"Philippe",
""
],
[
"Grandjean",
"Etienne",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606059
|
Sudebkumar Prasant Pal
|
Mridul Aanjaneya
|
Tromino tilings of Domino-Deficient Rectangles
|
19 pages, 13 figures
| null | null |
Technical Report no. IIT/CSE/TR/2006/MA/1, June 05, 2006, Dept. of
Computer Sc. and Engg., IIT Kharagpur 721302, India
|
cs.DM math.CO
| null |
We consider tromino tilings of $m\times n$ domino-deficient rectangles, where
$3|(mn-2)$ and $m,n\geq0$, and characterize all cases of domino removal that
admit such tilings, thereby settling the open problem posed by J. M. Ash and S.
Golomb in \cite {marshall}. Based on this characterization, we design a
procedure for constructing such a tiling if one exists. We also consider the
problem of counting such tilings and derive the exact formula for the number of
tilings for $2\times(3t+1)$ rectangles, the exact generating function for
$4\times(3t+2)$ rectangles, where $t\geq0$, and an upper bound on the number of
tromino tilings for $m\times n$ domino-deficient rectangles. We also consider
general 2-deficiency in $n\times4$ rectangles, where $n\geq8$, and characterize
all pairs of squares which do not permit a tromino tiling.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 12:52:55 GMT"
},
{
"version": "v2",
"created": "Mon, 13 Aug 2007 13:36:13 GMT"
}
] | 2007-08-13T00:00:00 |
[
[
"Aanjaneya",
"Mridul",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
},
{
"class": "Mathematics",
"code": "math.CO",
"description": "Discrete mathematics, graph theory, enumeration, combinatorial optimization, Ramsey theory, combinatorial game theory",
"span": "(Combinatorics)"
}
] |
cs/0606060
|
Luciano da Fontoura Costa
|
Luciano da Fontoura Costa
|
Complex Networks: New Concepts and Tools for Real-Time Imaging and
Vision
|
3 pages
| null | null | null |
cs.CV cs.DC physics.soc-ph
| null |
This article discusses how concepts and methods of complex networks can be
applied to real-time imaging and computer vision. After a brief introduction of
complex networks basic concepts, their use as means to represent and
characterize images, as well as for modeling visual saliency, are briefly
described. The possibility to apply complex networks in order to model and
simulate the performance of parallel and distributed computing systems for
performance of visual methods is also proposed.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 12:53:45 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Costa",
"Luciano da Fontoura",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CV",
"description": "Covers image processing, computer vision, pattern recognition, and scene understanding. Roughly includes material in ACM Subject Classes I.2.10, I.4, and I.5.",
"span": "(Computer Vision and Pattern Recognition)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
},
{
"class": "Physics",
"code": "physics.soc-ph",
"description": "Structure, dynamics and collective behavior of societies and groups (human or otherwise). Quantitative analysis of social networks and other complex networks. Physics and engineering of infrastructure and systems of broad societal impact (e.g., energy grids, transportation networks).",
"span": "(Physics and Society)"
}
] |
cs/0606061
|
Jean Gallier
|
Jean Gallier
|
On the Efficiency of Strategies for Subdividing Polynomial Triangular
Surface Patches
|
20 pages
| null | null | null |
cs.CG cs.GR
| null |
In this paper, we investigate the efficiency of various strategies for
subdividing polynomial triangular surface patches. We give a simple algorithm
performing a regular subdivision in four calls to the standard de Casteljau
algorithm (in its subdivision version). A naive version uses twelve calls. We
also show that any method for obtaining a regular subdivision using the
standard de Casteljau algorithm requires at least 4 calls. Thus, our method is
optimal. We give another subdivision algorithm using only three calls to the de
Casteljau algorithm. Instead of being regular, the subdivision pattern is
diamond-like. Finally, we present a ``spider-like'' subdivision scheme
producing six subtriangles in four calls to the de Casteljau algorithm.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 15:09:24 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Gallier",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CG",
"description": "Roughly includes material in ACM Subject Classes I.3.5 and F.2.2.",
"span": "(Computational Geometry)"
},
{
"class": "Computer Science",
"code": "cs.GR",
"description": "Covers all aspects of computer graphics. Roughly includes material in all of ACM Subject Class I.3, except that I.3.5 is is likely to have Computational Geometry as the primary subject area.",
"span": "(Graphics)"
}
] |
cs/0606062
|
Leonid Libkin
|
Leonid Libkin
|
Logics for Unranked Trees: An Overview
| null |
Logical Methods in Computer Science, Volume 2, Issue 3 (July 26,
2006) lmcs:2244
|
10.2168/LMCS-2(3:2)2006
| null |
cs.LO cs.DB
| null |
Labeled unranked trees are used as a model of XML documents, and logical
languages for them have been studied actively over the past several years. Such
logics have different purposes: some are better suited for extracting data,
some for expressing navigational properties, and some make it easy to relate
complex properties of trees to the existence of tree automata for those
properties. Furthermore, logics differ significantly in their model-checking
properties, their automata models, and their behavior on ordered and unordered
trees. In this paper we present a survey of logics for unranked trees.
|
[
{
"version": "v1",
"created": "Tue, 13 Jun 2006 16:27:28 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jul 2006 20:00:29 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Libkin",
"Leonid",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0606063
|
Adam Slagell
|
Adam Slagell, Kiran Lakkaraju and Katherine Luo
|
FLAIM: A Multi-level Anonymization Framework for Computer and Network
Logs
|
16 pages, 4 figures, in submission to USENIX Lisa
| null | null | null |
cs.CR
| null |
FLAIM (Framework for Log Anonymization and Information Management) addresses
two important needs not well addressed by current log anonymizers. First, it is
extremely modular and not tied to the specific log being anonymized. Second, it
supports multi-level anonymization, allowing system administrators to make
fine-grained trade-offs between information loss and privacy/security concerns.
In this paper, we examine anonymization solutions to date and note the above
limitations in each. We further describe how FLAIM addresses these problems,
and we describe FLAIM's architecture and features in detail.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 03:17:59 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Slagell",
"Adam",
""
],
[
"Lakkaraju",
"Kiran",
""
],
[
"Luo",
"Katherine",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606064
|
Hongtao Sun
|
Xin Li, Tian Liu, Han Peng, Hongtao Sun, Jiaqi Zhu
|
Improved Exponential Time Lower Bound of Knapsack Problem under BT model
|
9 pages, 3 figures
| null | null | null |
cs.CC
| null |
M.Alekhnovich et al. recently have proposed a model of algorithms, called BT
model, which covers Greedy, Backtrack and Simple Dynamic Programming methods
and can be further divided into fixed, adaptive and fully adaptive three kinds,
and have proved exponential time lower bounds of exact and approximation
algorithms under adaptive BT model for Knapsack problem which are
$\Omega(2^{n/2}/\sqrt n)=\Omega(2^{0.5n}/\sqrt n)$ and
$\Omega((1/\epsilon)^{1/3.17})\approx\Omega((1/\epsilon)^{0.315})$(for
approximation ratio $1-\epsilon$) respectively (M. Alekhovich, A. Borodin, J.
Buresh-Oppenheim, R. Impagliazzo, A. Magen, and T. Pitassi, Toward a Model for
Backtracking and Dynamic Programming, \emph{Proceedings of Twentieth Annual
IEEE Conference on Computational Complexity}, pp308-322, 2005). In this note,
we slightly improved their lower bounds to
$\Omega(2^{(2-\epsilon)n/3}/\sqrt{n})\approx \Omega(2^{0.66n}/\sqrt{n})$ and
$\Omega((1/\epsilon)^{1/2.38})\approx\Omega((1/\epsilon)^{0.420})$, and
proposed as an open question what is the best achievable lower bounds for
knapsack under adaptive BT models.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 07:54:14 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Li",
"Xin",
""
],
[
"Liu",
"Tian",
""
],
[
"Peng",
"Han",
""
],
[
"Sun",
"Hongtao",
""
],
[
"Zhu",
"Jiaqi",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606065
|
Frank Neven
|
Frank Neven and Thomas Schwentick
|
On the complexity of XPath containment in the presence of disjunction,
DTDs, and variables
|
30 pages, will appear in Logical Methods in Computer Science
(http://www.lmcs-online.org)
|
Logical Methods in Computer Science, Volume 2, Issue 3 (July 26,
2006) lmcs:2243
|
10.2168/LMCS-2(3:1)2006
| null |
cs.DB cs.LO
| null |
XPath is a simple language for navigating an XML-tree and returning a set of
answer nodes. The focus in this paper is on the complexity of the containment
problem for various fragments of XPath. We restrict attention to the most
common XPath expressions which navigate along the child and/or descendant axis.
In addition to basic expressions using only node tests and simple predicates,
we also consider disjunction and variables (ranging over nodes). Further, we
investigate the containment problem relative to a given DTD. With respect to
variables we study two semantics, (1) the original semantics of XPath, where
the values of variables are given by an outer context, and (2) an existential
semantics introduced by Deutsch and Tannen, in which the values of variables
are existentially quantified. In this framework, we establish an exact
classification of the complexity of the containment problem for many XPath
fragments.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 09:49:17 GMT"
},
{
"version": "v2",
"created": "Wed, 26 Jul 2006 19:57:13 GMT"
},
{
"version": "v3",
"created": "Sat, 12 Aug 2006 15:27:07 GMT"
},
{
"version": "v4",
"created": "Wed, 20 Sep 2006 09:20:04 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Neven",
"Frank",
""
],
[
"Schwentick",
"Thomas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606066
|
Audun Josang
|
Audun Josang
|
The Cumulative Rule for Belief Fusion
| null | null | null | null |
cs.AI
| null |
The problem of combining beliefs in the Dempster-Shafer belief theory has
attracted considerable attention over the last two decades. The classical
Dempster's Rule has often been criticised, and many alternative rules for
belief combination have been proposed in the literature. The consensus operator
for combining beliefs has nice properties and produces more intuitive results
than Dempster's rule, but has the limitation that it can only be applied to
belief distribution functions on binary state spaces. In this paper we present
a generalisation of the consensus operator that can be applied to Dirichlet
belief functions on state spaces of arbitrary size. This rule, called the
cumulative rule of belief combination, can be derived from classical
statistical theory, and corresponds well with human intuition.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 11:36:06 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Josang",
"Audun",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606067
|
Raphael Clifford
|
Michael A. Bender, Raphael Clifford and Kostas Tsichlas
|
Scheduling Algorithms for Procrastinators
|
12 pages, 3 figures
| null |
10.1007/s10951-007-0038-4
| null |
cs.DS
| null |
This paper presents scheduling algorithms for procrastinators, where the
speed that a procrastinator executes a job increases as the due date
approaches. We give optimal off-line scheduling policies for linearly
increasing speed functions. We then explain the computational/numerical issues
involved in implementing this policy. We next explore the online setting,
showing that there exist adversaries that force any online scheduling policy to
miss due dates. This impossibility result motivates the problem of minimizing
the maximum interval stretch of any job; the interval stretch of a job is the
job's flow time divided by the job's due date minus release time. We show that
several common scheduling strategies, including the "hit-the-highest-nail"
strategy beloved by procrastinators, have arbitrarily large maximum interval
stretch. Then we give the "thrashing" scheduling policy and show that it is a
\Theta(1) approximation algorithm for the maximum interval stretch.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 16:55:44 GMT"
},
{
"version": "v2",
"created": "Tue, 14 Aug 2007 10:27:35 GMT"
}
] | 2011-01-05T00:00:00 |
[
[
"Bender",
"Michael A.",
""
],
[
"Clifford",
"Raphael",
""
],
[
"Tsichlas",
"Kostas",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DS",
"description": "Covers data structures and analysis of algorithms. Roughly includes material in ACM Subject Classes E.1, E.2, F.2.1, and F.2.2.",
"span": "(Data Structures and Algorithms)"
}
] |
cs/0606068
|
Andreas U. Schmidt
|
Christian Hett, Nicolai Kuntze, and Andreas U. Schmidt
|
Security and Non-Repudiation for Voice-Over-IP Conversations
|
Poster presentation at the ISSA 2006 From Insight to Foresight
Conference, Sandton, South Africa, 5th-7th July 2006
| null | null | null |
cs.CR
| null |
We present a concept to achieve non-repudiation for natural language
conversations by electronically signing packet-based, digital, voice
communication. Signing a VoIP-based conversation means to protect the integrity
and authenticity of the bidirectional data stream and its temporal sequence
which together establish the security context of the communication. Our concept
is conceptually close to the protocols that embody VoIP and provides a high
level of inherent security. It enables signatures over voice as true
declarations of will, in principle between unacquainted speakers. We point to
trusted computing enabled devices as possible trusted signature terminals for
voice communication.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 12:24:29 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hett",
"Christian",
""
],
[
"Kuntze",
"Nicolai",
""
],
[
"Schmidt",
"Andreas U.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606069
|
Olivier Cappe
|
Lo\"is Rigouste (TSI), Olivier Capp\'e (TSI), Fran\c{c}ois Yvon (TSI)
|
Inference and Evaluation of the Multinomial Mixture Model for Text
Clustering
| null |
Information Processing & Management 43, 5 (01/09/2007) 1260?1280
|
10.1016/j.ipm.2006.11.001
| null |
cs.IR cs.CL
| null |
In this article, we investigate the use of a probabilistic model for
unsupervised clustering in text collections. Unsupervised clustering has become
a basic module for many intelligent text processing applications, such as
information retrieval, text classification or information extraction. The model
considered in this contribution consists of a mixture of multinomial
distributions over the word counts, each component corresponding to a different
theme. We present and contrast various estimation procedures, which apply both
in supervised and unsupervised contexts. In supervised learning, this work
suggests a criterion for evaluating the posterior odds of new documents which
is more statistically sound than the "naive Bayes" approach. In an unsupervised
context, we propose measures to set up a systematic evaluation framework and
start with examining the Expectation-Maximization (EM) algorithm as the basic
tool for inference. We discuss the importance of initialization and the
influence of other features such as the smoothing strategy or the size of the
vocabulary, thereby illustrating the difficulties incurred by the high
dimensionality of the parameter space. We also propose a heuristic algorithm
based on iterative EM with vocabulary reduction to solve this problem. Using
the fact that the latent variables can be analytically integrated out, we
finally show that Gibbs sampling algorithm is tractable and compares favorably
to the basic expectation maximization approach.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 14:44:06 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Rigouste",
"Loïs",
"",
"TSI"
],
[
"Cappé",
"Olivier",
"",
"TSI"
],
[
"Yvon",
"François",
"",
"TSI"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Computer Science",
"code": "cs.CL",
"description": "Covers natural language processing. Roughly includes material in ACM Subject Class I.2.7. Note that work on artificial languages (programming languages, logics, formal systems) that does not explicitly address natural-language issues broadly construed (natural-language processing, computational linguistics, speech, text retrieval, etc.) is not appropriate for this area.",
"span": "(Computation and Language)"
}
] |
cs/0606070
|
Shane Legg Mr
|
Shane Legg
|
Is there an Elegant Universal Theory of Prediction?
| null | null | null |
IDSIA - 12 - 06
|
cs.AI cs.CC
| null |
Solomonoff's inductive learning model is a powerful, universal and highly
elegant theory of sequence prediction. Its critical flaw is that it is
incomputable and thus cannot be used in practice. It is sometimes suggested
that it may still be useful to help guide the development of very general and
powerful theories of prediction which are computable. In this paper it is shown
that although powerful algorithms exist, they are necessarily highly complex.
This alone makes their theoretical analysis problematic, however it is further
shown that beyond a moderate level of complexity the analysis runs into the
deeper problem of Goedel incompleteness. This limits the power of mathematics
to analyse and study prediction algorithms, and indeed intelligent systems in
general.
|
[
{
"version": "v1",
"created": "Wed, 14 Jun 2006 15:22:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Legg",
"Shane",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
},
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606071
|
Mehdi Ansari Sadrabadi Mr.
|
Mehdi Ansari Sadrabadi, Alireza Bayesteh and Amir K. Khandani
|
Scheduling and Codeword Length Optimization in Time Varying Wireless
Networks
| null | null | null |
#2006-01
|
cs.IT math.IT
| null |
In this paper, a downlink scenario in which a single-antenna base station
communicates with K single antenna users, over a time-correlated fading
channel, is considered. It is assumed that channel state information is
perfectly known at each receiver, while the statistical characteristics of the
fading process and the fading gain at the beginning of each frame are known to
the transmitter. By evaluating the random coding error exponent of the
time-correlated fading channel, it is shown that there is an optimal codeword
length which maximizes the throughput. The throughput of the conventional
scheduling that transmits to the user with the maximum signal to noise ratio is
examined using both fixed length codewords and variable length codewords.
Although optimizing the codeword length improves the performance, it is shown
that using the conventional scheduling, the gap between the achievable
throughput and the maximum possible throughput of the system tends to infinity
as K goes to infinity. A simple scheduling that considers both the signal to
noise ratio and the channel time variation is proposed. It is shown that by
using this scheduling, the gap between the achievable throughput and the
maximum throughput of the system approaches zero.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 00:20:43 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2007 18:10:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sadrabadi",
"Mehdi Ansari",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606072
|
Masahito Hasegawa
|
Masahito Hasegawa
|
Relational Parametricity and Control
|
22 pages, for Logical Methods in Computer Science
|
Logical Methods in Computer Science, Volume 2, Issue 3 (July 27,
2006) lmcs:2245
|
10.2168/LMCS-2(3:3)2006
| null |
cs.PL cs.LO
| null |
We study the equational theory of Parigot's second-order
λμ-calculus in connection with a call-by-name continuation-passing
style (CPS) translation into a fragment of the second-order λ-calculus.
It is observed that the relational parametricity on the target calculus induces
a natural notion of equivalence on the λμ-terms. On the other hand,
the unconstrained relational parametricity on the λμ-calculus turns
out to be inconsistent with this CPS semantics. Following these facts, we
propose to formulate the relational parametricity on the λμ-calculus
in a constrained way, which might be called ``focal parametricity''.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 11:45:01 GMT"
},
{
"version": "v2",
"created": "Thu, 27 Jul 2006 11:13:26 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Hasegawa",
"Masahito",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.PL",
"description": "Covers programming language semantics, language features, programming approaches (such as object-oriented programming, functional programming, logic programming). Also includes material on compilers oriented towards programming languages; other material on compilers may be more appropriate in Architecture (AR). Roughly includes material in ACM Subject Classes D.1 and D.3.",
"span": "(Programming Languages)"
},
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606073
|
Muriel Roche
|
Muriel Roche (IF), Philippe R\'efr\'egier (IF)
|
Comparison of the estimation of the degree of polarization from four or
two intensity images degraded by speckle noise
| null |
EUSIPCO 2006 (2006) -
| null | null |
cs.IR physics.optics
| null |
Active polarimetric imagery is a powerful tool for accessing the information
present in a scene. Indeed, the polarimetric images obtained can reveal
polarizing properties of the objects that are not avalaible using conventional
imaging systems. However, when coherent light is used to illuminate the scene,
the images are degraded by speckle noise. The polarization properties of a
scene are characterized by the degree of polarization. In standard polarimetric
imagery system, four intensity images are needed to estimate this degree . If
we assume the uncorrelation of the measurements, this number can be decreased
to two images using the Orthogonal State Contrast Image (OSCI). However, this
approach appears too restrictive in some cases. We thus propose in this paper a
new statistical parametric method to estimate the degree of polarization
assuming correlated measurements with only two intensity images. The estimators
obtained from four images, from the OSCI and from the proposed method, are
compared using simulated polarimetric data degraded by speckle noise.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 13:13:30 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Roche",
"Muriel",
"",
"IF"
],
[
"Réfrégier",
"Philippe",
"",
"IF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.IR",
"description": "Covers indexing, dictionaries, retrieval, content and analysis. Roughly includes material in ACM Subject Classes H.3.0, H.3.1, H.3.2, H.3.3, and H.3.4.",
"span": "(Information Retrieval)"
},
{
"class": "Physics",
"code": "physics.optics",
"description": "Adaptive optics. Astronomical optics. Atmospheric optics. Biomedical optics. Cardinal points. Collimation. Doppler effect. Fiber optics. Fourier optics. Geometrical optics (Gradient index optics. Holography. Infrared optics. Integrated optics. Laser applications. Laser optical systems. Lasers. Light amplification. Light diffraction. Luminescence. Microoptics. Nano optics. Ocean optics. Optical computing. Optical devices. Optical imaging. Optical materials. Optical metrology. Optical microscopy. Optical properties. Optical signal processing. Optical testing techniques. Optical wave propagation. Paraxial optics. Photoabsorption. Photoexcitations. Physical optics. Physiological optics. Quantum optics. Segmented optics. Spectra. Statistical optics. Surface optics. Ultrafast optics. Wave optics. X-ray optics.",
"span": "(Optics)"
}
] |
cs/0606074
|
Yingbin Liang
|
Yingbin Liang and Gerhard Kramer
|
Rate Regions for Relay Broadcast Channels
|
Submitted to the IEEE Transactions on Information Theory, June 2006
| null | null | null |
cs.IT math.IT
| null |
A partially cooperative relay broadcast channel (RBC) is a three-node network
with one source node and two destination nodes (destinations 1 and 2) where
destination 1 can act as a relay to assist destination 2. Inner and outer
bounds on the capacity region of the discrete memoryless partially cooperative
RBC are obtained. When the relay function is disabled, the inner and outer
bounds reduce to new bounds on the capacity region of broadcast channels. Four
classes of RBCs are studied in detail. For the partially cooperative RBC with
degraded message sets, inner and outer bounds are obtained. For the
semideterministic partially cooperative RBC and the orthogonal partially
cooperative RBC, the capacity regions are established. For the parallel
partially cooperative RBC with unmatched degraded subchannels, the capacity
region is established for the case of degraded message sets. The capacity is
also established when the source node has only a private message for
destination 2, i.e., the channel reduces to a parallel relay channel with
unmatched degraded subchannels.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 14:41:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Kramer",
"Gerhard",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606075
|
Christoph Koch
|
Lyublena Antova, Christoph Koch, Dan Olteanu
|
10^(10^6) Worlds and Beyond: Efficient Representation and Processing of
Incomplete Information
|
17 pages, 24 figures
| null | null | null |
cs.DB
| null |
Current systems and formalisms for representing incomplete information
generally suffer from at least one of two weaknesses. Either they are not
strong enough for representing results of simple queries, or the handling and
processing of the data, e.g. for query evaluation, is intractable.
In this paper, we present a decomposition-based approach to addressing this
problem. We introduce world-set decompositions (WSDs), a space-efficient
formalism for representing any finite set of possible worlds over relational
databases. WSDs are therefore a strong representation system for any relational
query language. We study the problem of efficiently evaluating relational
algebra queries on sets of worlds represented by WSDs. We also evaluate our
technique experimentally in a large census data scenario and show that it is
both scalable and efficient.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2006 14:24:34 GMT"
},
{
"version": "v2",
"created": "Wed, 13 Feb 2008 23:36:24 GMT"
}
] | 2008-02-14T00:00:00 |
[
[
"Antova",
"Lyublena",
""
],
[
"Koch",
"Christoph",
""
],
[
"Olteanu",
"Dan",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DB",
"description": "Covers database management, datamining, and data processing. Roughly includes material in ACM Subject Classes E.2, E.5, H.0, H.2, and J.1.",
"span": "(Databases)"
}
] |
cs/0606076
|
Chen Bin Bin
|
Bin Bin Chen (INRIA Rh\^one-Alpes), Pascale Primet (INRIA
Rh\^one-Alpes)
|
A Flexible Bandwidth Reservation Framework for Bulk Data Transfers in
Grid Networks
| null | null | null | null |
cs.NI
| null |
In grid networks, distributed resources are interconnected by wide area
network to support compute and data-intensive applications, which require
reliable and efficient transfer of gigabits (even terabits) of data. Different
from best-effort traffic in Internet, bulk data transfer in grid requires
bandwidth reservation as a fundamental service. Existing reservation schemes
such as RSVP are designed for real-time traffic specified by reservation rate,
transfer start time but with unknown lifetime. In comparison, bulk data
transfer requests are defined in terms of volume and deadline, which provide
more information, and allow more flexibility in reservation schemes, i.e.,
transfer start time can be flexibly chosen, and reservation for a single
request can be divided into multiple intervals with different reservation
rates. We define a flexible reservation framework using time-rate function
algebra, and identify a series of practical reservation scheme families with
increasing generality and potential performance, namely, FixTime-FixRate,
FixTime-FlexRate, FlexTime-FlexRate, and Multi-Interval. Simple heuristics are
used to select representative scheme from each family for performance
comparison. Simulation results show that the increasing flexibility can
potentially improve system performance, minimizing both blocking probability
and mean flow time. We also discuss the distributed implementation of proposed
framework.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2006 14:32:10 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Chen",
"Bin Bin",
"",
"INRIA Rhône-Alpes"
],
[
"Primet",
"Pascale",
"",
"INRIA\n Rhône-Alpes"
]
] |
[
{
"class": "Computer Science",
"code": "cs.NI",
"description": "Covers all aspects of computer communication networks, including network architecture and design, network protocols, and internetwork standards (like TCP/IP). Also includes topics, such as web caching, that are directly relevant to Internet architecture and performance. Roughly includes all of ACM Subject Class C.2 except C.2.4, which is more likely to have Distributed, Parallel, and Cluster Computing as the primary subject area.",
"span": "(Networking and Internet Architecture)"
}
] |
cs/0606077
|
Marcus Hutter
|
Daniil Ryabko and Marcus Hutter
|
On Sequence Prediction for Arbitrary Measures
|
16 pages
|
Proc. IEEE International Symposium on Information Theory (ISIT
2007) pages 2346-2350
| null |
IDSIA-13-06
|
cs.LG
| null |
Suppose we are given two probability measures on the set of one-way infinite
finite-alphabet sequences and consider the question when one of the measures
predicts the other, that is, when conditional probabilities converge (in a
certain sense) when one of the measures is chosen to generate the sequence.
This question may be considered a refinement of the problem of sequence
prediction in its most general formulation: for a given class of probability
measures, does there exist a measure which predicts all of the measures in the
class? To address this problem, we find some conditions on local absolute
continuity which are sufficient for prediction and which generalize several
different notions which are known to be sufficient for prediction. We also
formulate some open questions to outline a direction for finding the conditions
on classes of measures for which prediction is possible.
|
[
{
"version": "v1",
"created": "Fri, 16 Jun 2006 16:33:23 GMT"
}
] | 2008-06-26T00:00:00 |
[
[
"Ryabko",
"Daniil",
""
],
[
"Hutter",
"Marcus",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LG",
"description": "Papers on all aspects of machine learning research (supervised, unsupervised, reinforcement learning, bandit problems, and so on) including also robustness, explanation, fairness, and methodology. cs.LG is also an appropriate primary category for applications of machine learning methods.",
"span": "(Machine Learning)"
}
] |
cs/0606078
|
David Doty
|
David Doty
|
Dimension Extractors and Optimal Decompression
|
This report was combined with a different conference paper "Every
Sequence is Decompressible from a Random One" (cs.IT/0511074, at
http://dx.doi.org/10.1007/11780342_17), and both titles were changed, with
the conference paper incorporated as section 5 of this new combined paper.
The combined paper was accepted to the journal Theory of Computing Systems,
as part of a special issue of invited papers from the second conference on
Computability in Europe, 2006
| null | null | null |
cs.CC cs.IT math.IT
| null |
A *dimension extractor* is an algorithm designed to increase the effective
dimension -- i.e., the amount of computational randomness -- of an infinite
binary sequence, in order to turn a "partially random" sequence into a "more
random" sequence. Extractors are exhibited for various effective dimensions,
including constructive, computable, space-bounded, time-bounded, and
finite-state dimension. Using similar techniques, the Kucera-Gacs theorem is
examined from the perspective of decompression, by showing that every infinite
sequence S is Turing reducible to a Martin-Loef random sequence R such that the
asymptotic number of bits of R needed to compute n bits of S, divided by n, is
precisely the constructive dimension of S, which is shown to be the optimal
ratio of query bits to computed bits achievable with Turing reductions. The
extractors and decompressors that are developed lead directly to new
characterizations of some effective dimensions in terms of optimal
decompression by Turing reductions.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 02:24:34 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Mar 2007 01:37:06 GMT"
}
] | 2007-07-16T00:00:00 |
[
[
"Doty",
"David",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
},
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606079
|
Stevan Harnad
|
C. Hajjem, S. Harnad, Y. Gingras
|
Ten-Year Cross-Disciplinary Comparison of the Growth of Open Access and
How it Increases Research Citation Impact
|
10 pages, 5 figures, 3 tables
|
IEEE Data Engineering Bulletin 28(4): 39-47; 2005
| null | null |
cs.DL
| null |
Lawrence (2001)found computer science articles that were openly accessible
(OA) on the Web were cited more. We replicated this in physics. We tested
1,307,038 articles published across 12 years (1992-2003) in 10 disciplines
(Biology, Psychology, Sociology, Health, Political Science, Economics,
Education, Law, Business, Management). A robot trawls the Web for full-texts
using reference metadata ISI citation data (signal detectability d'=2.45; bias
= 0.52). Percentage OA (relative to total OA + NOA) articles varies from 5%-16%
(depending on discipline, year and country) and is slowly climbing annually
(correlation r=.76, sample size N=12, probability p < 0.005). Comparing OA and
NOA articles in the same journal/year, OA articles have consistently more
citations, the advantage varying from 36%-172% by discipline and year.
Comparing articles within six citation ranges (0, 1, 2-3, 4-7, 8-15, 16+
citations), the annual percentage of OA articles is growing significantly
faster than NOA within every citation range (r > .90, N=12, p < .0005) and the
effect is greater with the more highly cited articles (r = .98, N=6, p < .005).
Causality cannot be determined from these data, but our prior finding of a
similar pattern in physics, where percent OA is much higher (and even
approaches 100% in some subfields), makes it unlikely that the OA citation
advantage is merely or mostly a self-selection bias (for making only one's
better articles OA). Further research will analyze the effect's timing, causal
components and relation to other variables.
|
[
{
"version": "v1",
"created": "Sun, 18 Jun 2006 19:51:18 GMT"
},
{
"version": "v2",
"created": "Tue, 15 Aug 2006 17:35:09 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Hajjem",
"C.",
""
],
[
"Harnad",
"S.",
""
],
[
"Gingras",
"Y.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DL",
"description": "Covers all aspects of the digital library design and document and text creation. Note that there will be some overlap with Information Retrieval (which is a separate subject area). Roughly includes material in ACM Subject Classes H.3.5, H.3.6, H.3.7, I.7.",
"span": "(Digital Libraries)"
}
] |
cs/0606080
|
Philippe Chapdelaine
|
Philippe Chapdelaine
|
On the structure of linear-time reducibility
|
10 pages
| null | null | null |
cs.CC
| null |
In 1975, Ladner showed that under the hypothesis that P is not equal to NP,
there exists a language which is neither in P, nor NP-complete. This result was
latter generalized by Schoning and several authors to various polynomial-time
complexity classes. We show here that such results also apply to linear-time
reductions on RAMs (resp. Turing machines), and hence allow for separation
results in linear-time classes similar to Ladner's ones for polynomial time.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 08:48:58 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Chapdelaine",
"Philippe",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CC",
"description": "Covers models of computation, complexity classes, structural complexity, complexity tradeoffs, upper and lower bounds. Roughly includes material in ACM Subject Classes F.1 (computation by abstract devices), F.2.3 (tradeoffs among complexity measures), and F.4.3 (formal languages), although some material in formal languages may be more appropriate for Logic in Computer Science. Some material in F.2.1 and F.2.2, may also be appropriate here, but is more likely to have Data Structures and Algorithms as the primary subject area.",
"span": "(Computational Complexity)"
}
] |
cs/0606081
|
Juergen Schmidhuber
|
Juergen Schmidhuber
|
New Millennium AI and the Convergence of History
|
Speed Prior: clarification / 15 pages, to appear in "Challenges to
Computational Intelligence"
| null | null |
IDSIA-14-06
|
cs.AI
| null |
Artificial Intelligence (AI) has recently become a real formal science: the
new millennium brought the first mathematically sound, asymptotically optimal,
universal problem solvers, providing a new, rigorous foundation for the
previously largely heuristic field of General AI and embedded agents. At the
same time there has been rapid progress in practical methods for learning true
sequence-processing programs, as opposed to traditional methods limited to
stationary pattern association. Here we will briefly review some of the new
results, and speculate about future developments, pointing out that the time
intervals between the most notable events in over 40,000 years or 2^9 lifetimes
of human history have sped up exponentially, apparently converging to zero
within the next few decades. Or is this impression just a by-product of the way
humans allocate memory space to past events?
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:13:43 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 14:35:37 GMT"
},
{
"version": "v3",
"created": "Thu, 29 Jun 2006 10:05:19 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Schmidhuber",
"Juergen",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606082
|
Jonathan Ben-Naim
|
Jonathan Ben-Naim (LIF)
|
Lack of Finite Characterizations for the Distance-based Revision
| null |
Tenth International Conference on Principles of Knowledge
Representation and Reasoning (KR'06) (2006) 239-248
| null | null |
cs.LO
| null |
Lehmann, Magidor, and Schlechta developed an approach to belief revision
based on distances between any two valuations. Suppose we are given such a
distance D. This defines an operator |D, called a distance operator, which
transforms any two sets of valuations V and W into the set V |D W of all
elements of W that are closest to V. This operator |D defines naturally the
revision of K by A as the set of all formulas satisfied in M(K) |D M(A) (i.e.
those models of A that are closest to the models of K). This constitutes a
distance-based revision operator. Lehmann et al. characterized families of them
using a loop condition of arbitrarily big size. An interesting question is
whether this loop condition can be replaced by a finite one. Extending the
results of Schlechta, we will provide elements of negative answer. In fact, we
will show that for families of distance operators, there is no "normal"
characterization. Approximatively, a normal characterization contains only
finite and universally quantified conditions. These results have an interest of
their own for they help to understand the limits of what is possible in this
area. Now, we are quite confident that this work can be continued to show
similar impossibility results for distance-based revision operators, which
suggests that the big loop condition cannot be simplified.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 09:34:27 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ben-Naim",
"Jonathan",
"",
"LIF"
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606083
|
Joakim Jalden
|
J. Jalden and B. Ottersten
|
The Diversity Order of the Semidefinite Relaxation Detector
|
Submitted to the IEEE Transactions on Information Theory, June 2006
| null | null | null |
cs.IT math.IT
| null |
We consider the detection of binary (antipodal) signals transmitted in a
spatially multiplexed fashion over a fading multiple-input multiple-output
(MIMO) channel and where the detection is done by means of semidefinite
relaxation (SDR). The SDR detector is an attractive alternative to maximum
likelihood (ML) detection since the complexity is polynomial rather than
exponential. Assuming that the channel matrix is drawn with i.i.d. real valued
Gaussian entries, we study the receiver diversity and prove that the SDR
detector achieves the maximum possible diversity. Thus, the error probability
of the receiver tends to zero at the same rate as the optimal maximum
likelihood (ML) receiver in the high signal to noise ratio (SNR) limit. This
significantly strengthens previous performance guarantees available for the
semidefinite relaxation detector. Additionally, it proves that full diversity
detection is in certain scenarios also possible when using a non-combinatorial
receiver structure.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 13:45:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jalden",
"J.",
""
],
[
"Ottersten",
"B.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606084
|
Jean Gallier
|
Jean Gallier
|
The Completeness of Propositional Resolution: A Simple and
Constructive<br> Proof
|
7 pages, submitted to LMCS
|
Logical Methods in Computer Science, Volume 2, Issue 5 (November
7, 2006) lmcs:2234
|
10.2168/LMCS-2(5:3)2006
| null |
cs.LO cs.AI
| null |
It is well known that the resolution method (for propositional logic) is
complete. However, completeness proofs found in the literature use an argument
by contradiction showing that if a set of clauses is unsatisfiable, then it
must have a resolution refutation. As a consequence, none of these proofs
actually gives an algorithm for producing a resolution refutation from an
unsatisfiable set of clauses. In this note, we give a simple and constructive
proof of the completeness of propositional resolution which consists of an
algorithm together with a proof of its correctness.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 17:40:42 GMT"
},
{
"version": "v2",
"created": "Mon, 9 Oct 2006 17:13:21 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Nov 2006 22:46:58 GMT"
}
] | 2017-01-11T00:00:00 |
[
[
"Gallier",
"Jean",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
},
{
"class": "Computer Science",
"code": "cs.AI",
"description": "Covers all areas of AI except Vision, Robotics, Machine Learning, Multiagent Systems, and Computation and Language (Natural Language Processing), which have separate subject areas. In particular, includes Expert Systems, Theorem Proving (although this may overlap with Logic in Computer Science), Knowledge Representation, Planning, and Uncertainty in AI. Roughly includes material in ACM Subject Classes I.2.0, I.2.1, I.2.3, I.2.4, I.2.8, and I.2.11.",
"span": "(Artificial Intelligence)"
}
] |
cs/0606085
|
Daniil Ryabko
|
Boris Ryabko, Daniil Ryabko
|
Provably Secure Universal Steganographic Systems
|
11 pages
| null | null |
Cryptology ePrint Archive, Report 2006/063
|
cs.CR
| null |
We propose a simple universal (that is, distribution--free) steganographic
system in which covertexts with and without hidden texts are statistically
indistinguishable. The stegosystem can be applied to any source generating
i.i.d. covertexts with unknown distribution, and the hidden text is transmitted
exactly, with zero probability of error. Moreover, the proposed steganographic
system has two important properties. First, the rate of transmission of hidden
information approaches the Shannon entropy of the covertext source as the size
of blocks used for hidden text encoding tends to infinity. Second, if the size
of the alphabet of the covertext source and its minentropy tend to infinity
then the number of bits of hidden text per letter of covertext tends to
$\log(n!)/n$ where $n$ is the (fixed) size of blocks used for hidden text
encoding. The proposed stegosystem uses randomization.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 08:41:52 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ryabko",
"Boris",
""
],
[
"Ryabko",
"Daniil",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
}
] |
cs/0606086
|
Marie-Claude Gaudel
|
Alain Denise (LRI), Marie-Claude Gaudel (LRI), Sandrine-Dominique
Gouraud (LRI), Richard Lasseigne (ELM), Sylvain Peyronnet (ELM), the RaST
Collaboration
|
Uniform Random Sampling of Traces in Very Large Models
| null |
First International Workshop on Random Testing, \'{E}tats-Unis
d'Am\'{e}rique (2006) 10-19
| null | null |
cs.LO
| null |
This paper presents some first results on how to perform uniform random walks
(where every trace has the same probability to occur) in very large models. The
models considered here are described in a succinct way as a set of
communicating reactive modules. The method relies upon techniques for counting
and drawing uniformly at random words in regular languages. Each module is
considered as an automaton defining such a language. It is shown how it is
possible to combine local uniform drawings of traces, and to obtain some global
uniform random sampling, without construction of the global model.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 09:53:41 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Denise",
"Alain",
"",
"LRI"
],
[
"Gaudel",
"Marie-Claude",
"",
"LRI"
],
[
"Gouraud",
"Sandrine-Dominique",
"",
"LRI"
],
[
"Lasseigne",
"Richard",
"",
"ELM"
],
[
"Peyronnet",
"Sylvain",
"",
"ELM"
],
[
"Collaboration",
"the RaST",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.LO",
"description": "Covers all aspects of logic in computer science, including finite model theory, logics of programs, modal logic, and program verification. Programming language semantics should have Programming Languages as the primary subject area. Roughly includes material in ACM Subject Classes D.2.4, F.3.1, F.4.0, F.4.1, and F.4.2; some material in F.4.3 (formal languages) may also be appropriate here, although Computational Complexity is typically the more appropriate subject area.",
"span": "(Logic in Computer Science)"
}
] |
cs/0606087
|
Leo Ruest
|
Bernd G\"artner and Jirka Matousek and Leo R\"ust and Petr Skovron
|
Violator Spaces: Structure and Algorithms
|
28 pages, 5 figures, extended abstract was presented at ESA 2006;
author spelling fixed
| null |
10.1007/11841036_36
| null |
cs.DM
|
http://arxiv.org/licenses/nonexclusive-distrib/1.0/
|
Sharir and Welzl introduced an abstract framework for optimization problems,
called LP-type problems or also generalized linear programming problems, which
proved useful in algorithm design. We define a new, and as we believe, simpler
and more natural framework: violator spaces, which constitute a proper
generalization of LP-type problems. We show that Clarkson's randomized
algorithms for low-dimensional linear programming work in the context of
violator spaces. For example, in this way we obtain the fastest known algorithm
for the P-matrix generalized linear complementarity problem with a constant
number of blocks. We also give two new characterizations of LP-type problems:
they are equivalent to acyclic violator spaces, as well as to concrete LP-type
problems (informally, the constraints in a concrete LP-type problem are subsets
of a linearly ordered ground set, and the value of a set of constraints is the
minimum of its intersection).
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 12:10:41 GMT"
},
{
"version": "v2",
"created": "Fri, 23 Jun 2006 11:08:13 GMT"
},
{
"version": "v3",
"created": "Tue, 22 Jul 2008 11:32:34 GMT"
}
] | 2008-07-22T00:00:00 |
[
[
"Gärtner",
"Bernd",
""
],
[
"Matousek",
"Jirka",
""
],
[
"Rüst",
"Leo",
""
],
[
"Skovron",
"Petr",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.DM",
"description": "Covers combinatorics, graph theory, applications of probability. Roughly includes material in ACM Subject Classes G.2 and G.3.",
"span": "(Discrete Mathematics)"
}
] |
cs/0606088
|
Paulo Condado
|
Paulo A. Condado, Fernando G. Lobo
|
Breaking barriers for people with voice disabilities: Combining virtual
keyboards with speech synthesizers, and VoIP applications
| null | null | null |
Also UAlg-ILAB Report No. 200604
|
cs.CY
| null |
Text-to-speech technology has been broadly used to help people with voice
disabilities to overcome their difficulties. With text-to-speech, a person
types at a keyboard, the text is synthesized, and the sound comes out through
the computer speakers.
In recent years, Voice over IP (VoIP) applications have become very popular
and have been used by people worldwide. These applications allow people to talk
for free over the Internet and also to make traditional calls through the
Public-Switched Telephone Network (PSTN) at a small fraction of the cost
offered by traditional phone companies.
We have created a system, called EasyVoice, which integrates speech
synthesizers with VoIP applications. The result allows a person with motor
impairments and voice disabilities to talk with another person located anywhere
in the world. The benefits in this case are much stronger than the ones
obtained by non-disabled people using VoIP applications. People with motor
impairments sometimes can hardly use a regular or mobile phone. Thus, the
advantage is not only the reduction in cost, but more important, the ability to
talk at all.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 12:22:15 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Condado",
"Paulo A.",
""
],
[
"Lobo",
"Fernando G.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CY",
"description": "Covers impact of computers on society, computer ethics, information technology and public policy, legal aspects of computing, computers and education. Roughly includes material in ACM Subject Classes K.0, K.2, K.3, K.4, K.5, and K.7.",
"span": "(Computers and Society)"
}
] |
cs/0606089
|
William Yurcik
|
Charis Ermopoulos and William Yurcik
|
NVision-PA: A Tool for Visual Analysis of Command Behavior Based on
Process Accounting Logs (with a Case Study in HPC Cluster Security)
|
25 pages, 13 Figures
| null | null | null |
cs.CR cs.DC
| null |
In the UNIX/Linux environment the kernel can log every command process
created by every user with process accounting. Thus process accounting logs
have many potential uses, particularly the monitoring and forensic
investigation of security events. Previous work successfully leveraged the use
of process accounting logs to identify a difficult to detect and damaging
intrusion against high performance computing (HPC) clusters, masquerade
attacks, where intruders masquerade as legitimate users with purloined
authentication credentials. While masqueraders on HPC clusters were found to be
identifiable with a high accuracy (greater than 90%), this accuracy is still
not high enough for HPC production environments where greater than 99% accuracy
is needed.
This paper incrementally advances the goal of more accurately identifying
masqueraders on HPC clusters by seeking to identify features within command
sets that distinguish masqueraders. To accomplish this goal, we created
NVision-PA, a software tool that produces text and graphic statistical
summaries describing input processing accounting logs. We report NVision-PA
results describing two different process accounting logs; one from Internet
usage and one from HPC cluster usage. These results identify the distinguishing
features of Internet users (as proxies for masqueraders) posing as clusters
users. This research is both a promising next step toward creating a real-time
masquerade detection sensor for production HPC clusters as well as providing
another tool for system administrators to use for statistically monitoring and
managing legitimate workloads (as indicated by command usage) in HPC
environments.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 16:53:02 GMT"
}
] | 2007-05-23T00:00:00 |
[
[
"Ermopoulos",
"Charis",
""
],
[
"Yurcik",
"William",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.CR",
"description": "Covers all areas of cryptography and security including authentication, public key cryptosytems, proof-carrying code, etc. Roughly includes material in ACM Subject Classes D.4.6 and E.3.",
"span": "(Cryptography and Security)"
},
{
"class": "Computer Science",
"code": "cs.DC",
"description": "Covers fault-tolerance, distributed algorithms, stabilility, parallel computation, and cluster computing. Roughly includes material in ACM Subject Classes C.1.2, C.1.4, C.2.4, D.1.3, D.4.5, D.4.7, E.1.",
"span": "(Distributed, Parallel, and Cluster Computing)"
}
] |
cs/0606090
|
Chris Snow
|
Chris Snow, Lutz Lampe and Robert Schober
|
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static
Fading Channels
|
31 pages, 9 figures, 1 table. Submitted to the IEEE Transactions on
Communications (June 20, 2006)
| null | null | null |
cs.IT math.IT
| null |
Several recent standards such as IEEE 802.11a/g, IEEE 802.16, and ECMA
Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) for high
data-rate Ultra-Wideband (UWB), employ bit-interleaved convolutionally-coded
multicarrier modulation over quasi-static fading channels. Motivated by the
lack of appropriate error rate analysis techniques for this popular type of
system and channel model, we present two novel analytical methods for bit error
rate (BER) estimation of coded multicarrier systems operating over
frequency-selective quasi-static channels with non-ideal interleaving. In the
first method, the approximate performance of the system is calculated for each
realization of the channel, which is suitable for obtaining the outage BER
performance (a common performance measure for e.g. MB-OFDM systems). The second
method assumes Rayleigh distributed frequency-domain subcarrier channel gains
and knowledge of their correlation matrix, and can be used to directly obtain
the average BER performance. Both methods are applicable to
convolutionally-coded interleaved multicarrier systems employing Quadrature
Amplitude Modulation (QAM), and are also able to account for narrowband
interference (modeled as a sum of tone interferers). To illustrate the
application of the proposed analysis, both methods are used to study the
performance of a tone-interference-impaired MB-OFDM system.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 21:32:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Snow",
"Chris",
""
],
[
"Lampe",
"Lutz",
""
],
[
"Schober",
"Robert",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.IT",
"description": "Covers theoretical and experimental aspects of information theory and coding. Includes material in ACM Subject Class E.4 and intersects with H.1.1.",
"span": "(Information Theory)"
},
{
"class": "Mathematics",
"code": "math.IT",
"description": "math.IT is an alias for cs.IT. Covers theoretical and experimental aspects of information theory and coding.",
"span": "(Information Theory)"
}
] |
cs/0606091
|
Nathalie Bertrand
|
C. Baier, N. Bertrand, Ph. Schnoebelen
|
On computing fixpoints in well-structured regular model checking, with
applications to lossy channel systems
|
16 pages
|
Proc. LPAR 2006, LNCS 4246, pp. 347-361, Springer 2006
|
10.1007/11916277_24
| null |
cs.SC cs.GT
| null |
We prove a general finite convergence theorem for "upward-guarded" fixpoint
expressions over a well-quasi-ordered set. This has immediate applications in
regular model checking of well-structured systems, where a main issue is the
eventual convergence of fixpoint computations. In particular, we are able to
directly obtain several new decidability results on lossy channel systems.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2006 15:49:13 GMT"
}
] | 2012-03-19T00:00:00 |
[
[
"Baier",
"C.",
""
],
[
"Bertrand",
"N.",
""
],
[
"Schnoebelen",
"Ph.",
""
]
] |
[
{
"class": "Computer Science",
"code": "cs.SC",
"description": "Roughly includes material in ACM Subject Class I.1.",
"span": "(Symbolic Computation)"
},
{
"class": "Computer Science",
"code": "cs.GT",
"description": "Covers all theoretical and applied aspects at the intersection of computer science and game theory, including work in mechanism design, learning in games (which may overlap with Learning), foundations of agent modeling in games (which may overlap with Multiagent systems), coordination, specification and formal methods for non-cooperative computational environments. The area also deals with applications of game theory to areas such as electronic commerce.",
"span": "(Computer Science and Game Theory)"
}
] |
cs/0606092
|
Christophe Joubert
|
Mar\'ia Del Mar Gallardo (GISUM), Christophe Joubert (GISUM), Pedro
Merino (GISUM)
|
Static Analysis using Parameterised Boolean Equation Systems
|
Submitted to an international 2006 conference
| null | null | null |
cs.SE
| null |
The well-known problem of state space explosion in model checking is even
more critical when applying this technique to programming languages, mainly due
to the presence of complex data structures. One recent and promising approach
to deal with this problem is the construction of an abstract and correct
representation of the global program state allowing to match visited states
during program model exploration. In particular, one powerful method to
implement abstract matching is to fill the state vector with a minimal amount
of relevant variables for each program point. In this paper, we combine the
on-the-fly model-checking approach (incremental construction of the program
state space) and the static analysis method called influence analysis
(extraction of significant variables for each program point) in order to
automatically construct an abstract matching function. Firstly, we describe the
problem as an alternation-free value-based mu-calculus formula, whose validity
can be checked on the program model expressed as a labeled transition system
(LTS). Secondly, we translate the analysis into the local resolution of a
parameterised boolean equation system (PBES), whose representation enables a
more efficient construction of the resulting abstract matching function.
Finally, we show how our proposal may be elegantly integrated into CADP, a
generic framework for both the design and analysis of distributed systems and
the development of verification tools.
|
[
{
"version": "v1",
"created": "Wed, 21 Jun 2006 07:23:25 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Jul 2006 15:58:28 GMT"
}
] | 2016-08-16T00:00:00 |
[
[
"Gallardo",
"María Del Mar",
"",
"GISUM"
],
[
"Joubert",
"Christophe",
"",
"GISUM"
],
[
"Merino",
"Pedro",
"",
"GISUM"
]
] |
[
{
"class": "Computer Science",
"code": "cs.SE",
"description": "Covers design tools, software metrics, testing and debugging, programming environments, etc. Roughly includes material in all of ACM Subject Classes D.2, except that D.2.4 (program verification) should probably have Logics in Computer Science as the primary subject area.",
"span": "(Software Engineering)"
}
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.